Summary | ZeroBOX

j-16

Malicious Library Downloader PE32 DLL PE File
Category Machine Started Completed
FILE s1_win7_x6403_us Oct. 17, 2023, 9:41 a.m. Oct. 17, 2023, 9:44 a.m.
Size 70.5KB
Type PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
MD5 2d544a42a3a073438330c81607df6ca7
SHA256 2d3fba110c968f24a030510c48e1d177cfcbf18924b4b0e45f4d96a6c0230662
CRC32 CA900618
ssdeep 768:G407txg6CVX762AORxFGPRDEEOsx3n+79Namb3GluLrXCS32Na1NzBoFsxHv5rMx:Gd7TGAgFqoQn+mmTCuL7HNzBl55rw3
Yara
  • Malicious_Library_Zero - Malicious_Library
  • Network_Downloader - File Downloader
  • PE_Header_Zero - PE File Signature
  • IsDLL - (no description)
  • IsPE32 - (no description)

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
223.26.52.96 Active Moloch

Suricata Alerts

Flow SID Signature Category
TCP 223.26.52.96:8000 -> 192.168.56.103:49163 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49164 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 192.168.56.103:49166 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49172 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49171 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49165 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49168 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49167 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49179 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49180 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49173 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49174 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49192 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49181 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49175 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49182 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49178 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49183 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49195 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49197 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49190 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49177 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49185 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49196 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49191 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49201 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49184 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49186 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49198 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49202 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49187 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49207 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49188 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49206 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49223 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49193 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 223.26.52.96:8000 -> 192.168.56.103:49222 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 192.168.56.103:49189 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49213 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49200 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49194 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 223.26.52.96:8000 -> 192.168.56.103:49218 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49224 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 192.168.56.103:49210 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49203 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49228 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49208 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49212 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49229 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49211 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49214 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49231 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49215 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49219 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49234 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49216 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49235 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49226 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49246 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49236 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49233 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49249 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49251 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49254 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49238 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49252 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49263 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49240 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49244 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49265 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49169 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 223.26.52.96:8000 -> 192.168.56.103:49266 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 192.168.56.103:49269 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49170 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49268 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49245 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49275 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49176 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49272 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49250 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49283 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49199 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49285 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49276 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49217 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49297 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49204 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 223.26.52.96:8000 -> 192.168.56.103:49286 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 192.168.56.103:49225 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49282 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49316 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49205 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49289 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49288 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 223.26.52.96:8000 -> 192.168.56.103:49239 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 192.168.56.103:49227 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49209 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49290 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49243 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49293 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49232 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49220 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49294 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49248 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49237 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49295 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49230 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49302 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49261 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49255 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49309 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49241 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49306 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49264 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49256 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49310 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49319 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 223.26.52.96:8000 -> 192.168.56.103:49242 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 192.168.56.103:49271 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49258 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 223.26.52.96:8000 -> 192.168.56.103:49247 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 192.168.56.103:49314 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49274 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49321 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 223.26.52.96:8000 -> 192.168.56.103:49260 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 192.168.56.103:49253 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49315 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49278 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49267 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49257 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 223.26.52.96:8000 -> 192.168.56.103:49328 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 192.168.56.103:49317 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49279 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49259 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49331 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49291 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49326 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49262 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49335 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49296 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49339 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49270 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49341 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49298 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49343 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49277 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49351 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49299 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49347 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49287 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49353 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49305 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49292 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49323 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49308 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49273 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49300 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49313 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49324 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49280 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49301 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 223.26.52.96:8000 -> 192.168.56.103:49320 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49330 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 192.168.56.103:49281 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49303 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49333 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 223.26.52.96:8000 -> 192.168.56.103:49322 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49284 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 192.168.56.103:49311 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 223.26.52.96:8000 -> 192.168.56.103:49325 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 192.168.56.103:49338 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49304 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49312 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49337 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49340 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 223.26.52.96:8000 -> 192.168.56.103:49307 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 192.168.56.103:49318 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49342 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49349 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49329 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49327 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49348 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49361 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49350 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49332 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49334 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49352 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49355 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49362 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49344 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49336 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49354 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49364 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49345 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49357 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49358 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49369 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49381 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49346 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49359 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49373 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49376 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49360 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49363 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49356 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49386 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49366 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49365 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49378 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49390 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49367 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49382 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49372 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49393 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49374 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49380 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49415 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49375 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49387 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49419 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49383 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49377 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49388 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49422 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49389 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49400 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 223.26.52.96:8000 -> 192.168.56.103:49385 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 192.168.56.103:49423 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49391 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49408 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49397 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49398 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49424 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49416 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49399 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49406 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49426 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49435 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49404 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49411 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49401 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49428 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 223.26.52.96:8000 -> 192.168.56.103:49405 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 192.168.56.103:49418 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49368 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49434 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49402 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49410 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49436 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49371 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49403 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49412 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49437 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49379 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 223.26.52.96:8000 -> 192.168.56.103:49407 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 192.168.56.103:49417 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49384 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49409 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49420 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49392 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49421 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 223.26.52.96:8000 -> 192.168.56.103:49413 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 192.168.56.103:49394 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49414 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49430 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49395 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49431 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49425 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49396 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49427 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49429 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49432 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49433 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49442 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 223.26.52.96:8000 -> 192.168.56.103:49438 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 192.168.56.103:49440 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49455 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 223.26.52.96:8000 -> 192.168.56.103:49443 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 192.168.56.103:49441 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49462 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49450 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 223.26.52.96:8000 -> 192.168.56.103:49449 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 192.168.56.103:49465 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49451 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49456 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 223.26.52.96:8000 -> 192.168.56.103:49469 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 192.168.56.103:49459 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 223.26.52.96:8000 -> 192.168.56.103:49457 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 192.168.56.103:49439 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49472 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49464 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 223.26.52.96:8000 -> 192.168.56.103:49466 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 192.168.56.103:49458 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 223.26.52.96:8000 -> 192.168.56.103:49490 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 192.168.56.103:49467 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 223.26.52.96:8000 -> 192.168.56.103:49473 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 192.168.56.103:49463 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49504 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49474 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49477 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49468 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49514 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49487 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 223.26.52.96:8000 -> 192.168.56.103:49478 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 192.168.56.103:49444 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49479 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49528 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49446 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49445 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49488 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49448 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49447 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49534 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49453 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 223.26.52.96:8000 -> 192.168.56.103:49452 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 192.168.56.103:49537 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49470 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49475 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49454 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49480 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49544 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49482 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 223.26.52.96:8000 -> 192.168.56.103:49460 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 192.168.56.103:49481 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49495 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49497 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49461 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49503 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49499 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 223.26.52.96:8000 -> 192.168.56.103:49471 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 192.168.56.103:49505 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49552 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49501 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49476 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49553 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49502 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49527 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 223.26.52.96:8000 -> 192.168.56.103:49483 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 192.168.56.103:49506 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49557 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49531 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49491 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49561 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49507 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49492 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49536 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49570 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49517 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49493 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49538 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49574 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49526 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49496 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49540 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49592 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 223.26.52.96:8000 -> 192.168.56.103:49533 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 192.168.56.103:49518 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49543 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49597 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49545 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 223.26.52.96:8000 -> 192.168.56.103:49486 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 192.168.56.103:49551 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49494 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49484 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49547 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49601 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49556 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49485 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49498 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49563 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49560 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49610 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49508 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49564 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49489 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49562 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49611 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49519 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49567 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49500 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49612 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49521 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49573 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49579 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49615 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49509 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49522 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49576 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49510 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 223.26.52.96:8000 -> 192.168.56.103:49629 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 192.168.56.103:49511 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49520 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 223.26.52.96:8000 -> 192.168.56.103:49529 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 192.168.56.103:49580 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49512 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49530 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49523 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49513 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49549 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49525 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49589 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49583 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49535 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49554 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49585 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49591 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49539 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49595 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49515 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49546 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49604 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49550 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49516 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49606 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49565 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49524 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49635 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49609 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49566 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49532 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49637 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49617 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49569 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49541 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49643 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 223.26.52.96:8000 -> 192.168.56.103:49619 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 192.168.56.103:49584 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 223.26.52.96:8000 -> 192.168.56.103:49542 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 192.168.56.103:49647 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49623 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49588 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49548 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49656 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 223.26.52.96:8000 -> 192.168.56.103:49624 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 192.168.56.103:49590 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49555 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49660 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49628 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49594 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49558 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49676 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 223.26.52.96:8000 -> 192.168.56.103:49639 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 192.168.56.103:49559 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49683 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 223.26.52.96:8000 -> 192.168.56.103:49642 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 192.168.56.103:49603 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49568 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49687 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49646 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49608 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49689 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49651 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49593 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49696 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 223.26.52.96:8000 -> 192.168.56.103:49613 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 192.168.56.103:49577 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49598 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49631 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49599 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49578 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49633 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49602 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49586 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49644 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49596 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49605 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49650 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49620 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49607 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49571 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 223.26.52.96:8000 -> 192.168.56.103:49654 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 192.168.56.103:49652 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49698 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49614 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49653 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49707 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49622 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49668 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49572 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49625 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49713 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49575 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 223.26.52.96:8000 -> 192.168.56.103:49626 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 192.168.56.103:49621 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49662 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49721 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49630 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49581 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49627 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49663 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49724 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49641 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49582 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49730 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49672 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49657 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49634 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49587 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49731 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49664 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49673 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49640 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49600 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49747 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49666 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49674 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49658 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 223.26.52.96:8000 -> 192.168.56.103:49616 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 192.168.56.103:49750 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49677 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49679 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49665 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49618 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49678 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 223.26.52.96:8000 -> 192.168.56.103:49751 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 192.168.56.103:49688 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49667 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49632 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49764 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49680 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49694 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49671 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49636 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49766 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49685 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49701 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49681 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49638 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49781 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49700 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49703 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49682 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49645 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49786 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49722 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49706 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49686 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49648 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49790 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49728 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49690 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49709 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49649 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49806 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49740 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49715 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 223.26.52.96:8000 -> 192.168.56.103:49659 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 192.168.56.103:49693 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49812 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49745 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49661 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49726 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49695 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49819 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49770 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49669 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49732 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49699 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49771 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 223.26.52.96:8000 -> 192.168.56.103:49820 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 192.168.56.103:49675 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49735 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49702 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49774 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49821 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49691 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49736 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49708 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49776 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49822 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49692 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49737 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49711 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49777 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 223.26.52.96:8000 -> 192.168.56.103:49670 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 192.168.56.103:49704 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49743 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49712 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49779 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49684 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49710 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49714 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49780 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 223.26.52.96:8000 -> 192.168.56.103:49749 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 192.168.56.103:49697 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49719 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49716 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49752 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49782 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49705 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49727 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49720 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49785 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49756 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49717 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49741 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49729 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49792 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49757 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49718 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49758 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49796 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49733 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49759 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49723 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49760 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49802 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49765 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49725 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49734 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49761 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49807 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49769 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49739 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49738 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49808 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49767 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49772 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49742 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 223.26.52.96:8000 -> 192.168.56.103:49744 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 192.168.56.103:49809 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49768 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49784 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49748 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49746 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49793 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 223.26.52.96:8000 -> 192.168.56.103:49811 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 192.168.56.103:49753 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49755 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49787 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49813 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 223.26.52.96:8000 -> 192.168.56.103:49797 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 192.168.56.103:49803 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49754 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49762 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49815 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49800 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49763 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49778 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49804 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49801 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49773 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49783 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49805 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49823 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49775 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49814 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49788 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49825 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49789 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49791 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 223.26.52.96:8000 -> 192.168.56.103:49824 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 192.168.56.103:49829 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49795 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49794 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49798 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49810 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49799 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49817 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 223.26.52.96:8000 -> 192.168.56.103:49816 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 192.168.56.103:49818 -> 223.26.52.96:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 223.26.52.96:8000 -> 192.168.56.103:49325 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 223.26.52.96:8000 -> 192.168.56.103:49218 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 223.26.52.96:8000 -> 192.168.56.103:49452 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 223.26.52.96:8000 -> 192.168.56.103:49266 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 223.26.52.96:8000 -> 192.168.56.103:49247 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 223.26.52.96:8000 -> 192.168.56.103:49325 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49452 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49218 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49266 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49247 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49405 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 223.26.52.96:8000 -> 192.168.56.103:49218 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49325 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49266 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49218 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49405 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49247 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49325 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49218 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49266 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49452 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49247 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49218 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 223.26.52.96:8000 -> 192.168.56.103:49325 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49452 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49247 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49405 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49266 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49247 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 223.26.52.96:8000 -> 192.168.56.103:49405 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49266 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 223.26.52.96:8000 -> 192.168.56.103:49247 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 223.26.52.96:8000 -> 192.168.56.103:49325 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 223.26.52.96:8000 -> 192.168.56.103:49266 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 223.26.52.96:8000 -> 192.168.56.103:49405 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49452 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49325 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 223.26.52.96:8000 -> 192.168.56.103:49405 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 223.26.52.96:8000 -> 192.168.56.103:49452 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 223.26.52.96:8000 -> 192.168.56.103:49405 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 223.26.52.96:8000 -> 192.168.56.103:49452 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 223.26.52.96:8000 -> 192.168.56.103:49218 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 223.26.52.96:8000 -> 192.168.56.103:49654 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 223.26.52.96:8000 -> 192.168.56.103:49654 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49654 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49654 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49654 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49654 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 223.26.52.96:8000 -> 192.168.56.103:49654 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 223.26.52.96:8000 -> 192.168.56.103:49473 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 223.26.52.96:8000 -> 192.168.56.103:49473 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49473 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49473 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49473 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49438 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 223.26.52.96:8000 -> 192.168.56.103:49473 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 223.26.52.96:8000 -> 192.168.56.103:49438 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49473 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 223.26.52.96:8000 -> 192.168.56.103:49438 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49242 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 223.26.52.96:8000 -> 192.168.56.103:49438 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49242 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49242 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49242 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49242 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49242 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 223.26.52.96:8000 -> 192.168.56.103:49242 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 223.26.52.96:8000 -> 192.168.56.103:49438 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49438 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 223.26.52.96:8000 -> 192.168.56.103:49438 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 223.26.52.96:8000 -> 192.168.56.103:49307 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 223.26.52.96:8000 -> 192.168.56.103:49307 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49307 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49307 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49307 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49624 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 223.26.52.96:8000 -> 192.168.56.103:49624 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49307 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 223.26.52.96:8000 -> 192.168.56.103:49624 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49307 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 223.26.52.96:8000 -> 192.168.56.103:49624 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49624 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49624 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 223.26.52.96:8000 -> 192.168.56.103:49624 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 223.26.52.96:8000 -> 192.168.56.103:49816 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 223.26.52.96:8000 -> 192.168.56.103:49816 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49816 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49816 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49816 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49816 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 223.26.52.96:8000 -> 192.168.56.103:49816 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 223.26.52.96:8000 -> 192.168.56.103:49749 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 223.26.52.96:8000 -> 192.168.56.103:49749 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49749 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49749 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49749 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49749 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 223.26.52.96:8000 -> 192.168.56.103:49749 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 223.26.52.96:8000 -> 192.168.56.103:49642 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 223.26.52.96:8000 -> 192.168.56.103:49642 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49642 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49642 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49642 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49642 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 223.26.52.96:8000 -> 192.168.56.103:49642 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 223.26.52.96:8000 -> 192.168.56.103:49239 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 223.26.52.96:8000 -> 192.168.56.103:49239 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49239 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49239 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49239 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49239 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 223.26.52.96:8000 -> 192.168.56.103:49239 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 223.26.52.96:8000 -> 192.168.56.103:49164 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 223.26.52.96:8000 -> 192.168.56.103:49164 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49164 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49164 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49164 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49164 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 223.26.52.96:8000 -> 192.168.56.103:49164 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 223.26.52.96:8000 -> 192.168.56.103:49490 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 223.26.52.96:8000 -> 192.168.56.103:49490 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49490 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49490 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49490 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49490 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 223.26.52.96:8000 -> 192.168.56.103:49490 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 223.26.52.96:8000 -> 192.168.56.103:49478 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 223.26.52.96:8000 -> 192.168.56.103:49811 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 223.26.52.96:8000 -> 192.168.56.103:49478 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49811 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49478 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49811 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49478 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49811 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49478 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49811 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49478 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 223.26.52.96:8000 -> 192.168.56.103:49811 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 223.26.52.96:8000 -> 192.168.56.103:49478 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 223.26.52.96:8000 -> 192.168.56.103:49811 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 223.26.52.96:8000 -> 192.168.56.103:49613 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 223.26.52.96:8000 -> 192.168.56.103:49613 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49613 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49613 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49613 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49613 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 223.26.52.96:8000 -> 192.168.56.103:49443 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 223.26.52.96:8000 -> 192.168.56.103:49613 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 223.26.52.96:8000 -> 192.168.56.103:49824 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 223.26.52.96:8000 -> 192.168.56.103:49443 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49824 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49443 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49824 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49443 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49824 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49824 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49824 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 223.26.52.96:8000 -> 192.168.56.103:49824 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 223.26.52.96:8000 -> 192.168.56.103:49443 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49443 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 223.26.52.96:8000 -> 192.168.56.103:49443 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 223.26.52.96:8000 -> 192.168.56.103:49542 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 223.26.52.96:8000 -> 192.168.56.103:49542 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49542 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49542 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49449 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 223.26.52.96:8000 -> 192.168.56.103:49542 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49449 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49542 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 223.26.52.96:8000 -> 192.168.56.103:49449 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49542 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 223.26.52.96:8000 -> 192.168.56.103:49385 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 223.26.52.96:8000 -> 192.168.56.103:49385 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49385 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49385 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49751 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 223.26.52.96:8000 -> 192.168.56.103:49385 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49751 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49751 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49385 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 223.26.52.96:8000 -> 192.168.56.103:49751 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49385 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 223.26.52.96:8000 -> 192.168.56.103:49751 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49751 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 223.26.52.96:8000 -> 192.168.56.103:49751 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 223.26.52.96:8000 -> 192.168.56.103:49797 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 223.26.52.96:8000 -> 192.168.56.103:49449 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49797 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49449 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49797 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49449 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 223.26.52.96:8000 -> 192.168.56.103:49797 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49449 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 223.26.52.96:8000 -> 192.168.56.103:49797 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49469 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 223.26.52.96:8000 -> 192.168.56.103:49469 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49797 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 223.26.52.96:8000 -> 192.168.56.103:49469 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49797 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 223.26.52.96:8000 -> 192.168.56.103:49469 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49469 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49469 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 223.26.52.96:8000 -> 192.168.56.103:49469 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 223.26.52.96:8000 -> 192.168.56.103:49466 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 223.26.52.96:8000 -> 192.168.56.103:49466 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49320 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 223.26.52.96:8000 -> 192.168.56.103:49466 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49320 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49466 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49320 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49466 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49320 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49466 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 223.26.52.96:8000 -> 192.168.56.103:49320 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49466 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 223.26.52.96:8000 -> 192.168.56.103:49320 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 223.26.52.96:8000 -> 192.168.56.103:49320 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 223.26.52.96:8000 -> 192.168.56.103:49616 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 223.26.52.96:8000 -> 192.168.56.103:49616 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49616 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49616 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49616 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49616 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 223.26.52.96:8000 -> 192.168.56.103:49616 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 223.26.52.96:8000 -> 192.168.56.103:49629 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 223.26.52.96:8000 -> 192.168.56.103:49629 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49407 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 223.26.52.96:8000 -> 192.168.56.103:49629 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49407 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49629 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49407 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49629 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49407 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49407 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49629 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 223.26.52.96:8000 -> 192.168.56.103:49629 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 223.26.52.96:8000 -> 192.168.56.103:49407 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 223.26.52.96:8000 -> 192.168.56.103:49407 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 223.26.52.96:8000 -> 192.168.56.103:49619 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 223.26.52.96:8000 -> 192.168.56.103:49619 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49619 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49619 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49619 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49619 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 223.26.52.96:8000 -> 192.168.56.103:49619 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 223.26.52.96:8000 -> 192.168.56.103:49163 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 223.26.52.96:8000 -> 192.168.56.103:49163 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49163 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49163 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49224 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 223.26.52.96:8000 -> 192.168.56.103:49163 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49224 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49163 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 223.26.52.96:8000 -> 192.168.56.103:49457 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 223.26.52.96:8000 -> 192.168.56.103:49224 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49163 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 223.26.52.96:8000 -> 192.168.56.103:49457 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49224 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49457 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49224 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49224 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 223.26.52.96:8000 -> 192.168.56.103:49224 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 223.26.52.96:8000 -> 192.168.56.103:49457 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49457 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49457 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 223.26.52.96:8000 -> 192.168.56.103:49457 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 223.26.52.96:8000 -> 192.168.56.103:49286 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 223.26.52.96:8000 -> 192.168.56.103:49286 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49286 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49286 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49286 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49286 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 223.26.52.96:8000 -> 192.168.56.103:49286 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 223.26.52.96:8000 -> 192.168.56.103:49659 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 223.26.52.96:8000 -> 192.168.56.103:49659 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49659 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49659 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49659 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49659 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 223.26.52.96:8000 -> 192.168.56.103:49659 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 223.26.52.96:8000 -> 192.168.56.103:49413 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 223.26.52.96:8000 -> 192.168.56.103:49413 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49413 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49820 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 223.26.52.96:8000 -> 192.168.56.103:49413 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49820 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49413 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49820 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49413 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 223.26.52.96:8000 -> 192.168.56.103:49820 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49413 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 223.26.52.96:8000 -> 192.168.56.103:49260 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 223.26.52.96:8000 -> 192.168.56.103:49820 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49260 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49820 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 223.26.52.96:8000 -> 192.168.56.103:49260 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49820 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 223.26.52.96:8000 -> 192.168.56.103:49260 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49260 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49260 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 223.26.52.96:8000 -> 192.168.56.103:49260 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 223.26.52.96:8000 -> 192.168.56.103:49486 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 223.26.52.96:8000 -> 192.168.56.103:49486 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49486 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49486 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49486 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49486 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 223.26.52.96:8000 -> 192.168.56.103:49486 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 223.26.52.96:8000 -> 192.168.56.103:49533 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 223.26.52.96:8000 -> 192.168.56.103:49533 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49533 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49533 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49533 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49533 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 223.26.52.96:8000 -> 192.168.56.103:49533 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 223.26.52.96:8000 -> 192.168.56.103:49483 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 223.26.52.96:8000 -> 192.168.56.103:49483 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49483 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49483 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49483 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49483 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 223.26.52.96:8000 -> 192.168.56.103:49483 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 223.26.52.96:8000 -> 192.168.56.103:49328 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 223.26.52.96:8000 -> 192.168.56.103:49529 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 223.26.52.96:8000 -> 192.168.56.103:49328 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49328 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49529 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49328 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49529 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49328 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49529 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49328 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 223.26.52.96:8000 -> 192.168.56.103:49529 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49744 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 223.26.52.96:8000 -> 192.168.56.103:49529 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 223.26.52.96:8000 -> 192.168.56.103:49328 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 223.26.52.96:8000 -> 192.168.56.103:49744 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49529 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 223.26.52.96:8000 -> 192.168.56.103:49744 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49744 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49744 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49744 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 223.26.52.96:8000 -> 192.168.56.103:49744 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 223.26.52.96:8000 -> 192.168.56.103:49222 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 223.26.52.96:8000 -> 192.168.56.103:49222 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49222 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49222 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49222 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49222 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 223.26.52.96:8000 -> 192.168.56.103:49222 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 223.26.52.96:8000 -> 192.168.56.103:49330 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 223.26.52.96:8000 -> 192.168.56.103:49460 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 223.26.52.96:8000 -> 192.168.56.103:49330 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49460 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49330 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49460 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49330 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49670 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 223.26.52.96:8000 -> 192.168.56.103:49460 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49330 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49460 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49330 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 223.26.52.96:8000 -> 192.168.56.103:49670 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49460 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 223.26.52.96:8000 -> 192.168.56.103:49330 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 223.26.52.96:8000 -> 192.168.56.103:49670 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49460 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 223.26.52.96:8000 -> 192.168.56.103:49670 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49670 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49670 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 223.26.52.96:8000 -> 192.168.56.103:49670 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 223.26.52.96:8000 -> 192.168.56.103:49639 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 223.26.52.96:8000 -> 192.168.56.103:49639 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49639 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49284 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 223.26.52.96:8000 -> 192.168.56.103:49639 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49284 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49639 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49284 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49639 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 223.26.52.96:8000 -> 192.168.56.103:49284 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49639 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 223.26.52.96:8000 -> 192.168.56.103:49284 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49284 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 223.26.52.96:8000 -> 192.168.56.103:49284 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 223.26.52.96:8000 -> 192.168.56.103:49471 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 223.26.52.96:8000 -> 192.168.56.103:49471 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49471 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49471 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49471 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49471 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 223.26.52.96:8000 -> 192.168.56.103:49471 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 223.26.52.96:8000 -> 192.168.56.103:49322 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 223.26.52.96:8000 -> 192.168.56.103:49322 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49322 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49322 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49322 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49322 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 223.26.52.96:8000 -> 192.168.56.103:49322 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 223.26.52.96:8000 -> 192.168.56.103:49626 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 223.26.52.96:8000 -> 192.168.56.103:49626 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49626 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49626 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49626 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 223.26.52.96:8000 -> 192.168.56.103:49626 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 223.26.52.96:8000 -> 192.168.56.103:49626 2014520 ET INFO EXE - Served Attached HTTP Misc activity

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0
suspicious_features Connection to IP address suspicious_request GET http://223.26.52.96:8000/1
request GET http://223.26.52.96:8000/1
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 776
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x744dd000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 776
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x752e1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 776
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x76e01000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 776
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x75931000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 776
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x74460000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 776
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x744f1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 776
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x74101000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 776
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x740f1000
process_handle: 0xffffffff
1 0 0
Time & API Arguments Status Return Repeated

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9937604608
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9937600512
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9937596416
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9937588224
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9937584128
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9937559552
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9937555456
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9937547264
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9937551360
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9937539072
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9937514496
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9937502208
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9937502208
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9937489920
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9937489920
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9937477632
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9937473536
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9937461248
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9937461248
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9937448960
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9937436672
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9937432576
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9937428480
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9937526784
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9937739776
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9937747968
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9937260544
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9937731584
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9937731584
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9937719296
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9937719296
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9937707008
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9937707008
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9937694720
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9937694720
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9937682432
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9937682432
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9937670144
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9937670144
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9937690624
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9937739776
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9937256448
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9937723392
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9937727488
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9937715200
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9937657856
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9937788928
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9937682432
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9937821696
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9937334272
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0
file C:\Users\test22\AppData\Roaming\9cYbPVFeRS.exe
file C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\VKMIWH9C\1[2]
Time & API Arguments Status Return Repeated

recv

buffer: HTTP/1.1 200 OK content-length: 487920 accept-ranges: bytes last-modified: Fri, 25 Aug 2023 12:28:24 GMT etag: "0:771f0:64e89e68:39f2e340" content-disposition: attachment; filename="1" content-type: application/octet-stream date: Tue, 17 Oct 2023 00:42:01 GMT MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $aõ%s¦%s¦%s¦s`¦s¦¦}¦s¦q=C¦?s¦Ú>y¦(s¦%r¦xs¦G`¦<s¦8y¦÷s¦8x¦s¦%s¦¤s¦âu¦$s¦Rich%s¦PEL¸õTà à€€ _ p@ð‘¯håÄphuPð!UPX0€ €àUPX1à Ò@à.rsrc€pzÖ@À
received: 1024
socket: 752
1 1024 0

recv

buffer: HTTP/1.1 200 OK content-length: 487920 etag: "0:771f0:64e89e68:39f2e340" last-modified: Fri, 25 Aug 2023 12:28:24 GMT accept-ranges: bytes content-type: application/octet-stream content-disposition: attachment; filename="1" date: Tue, 17 Oct 2023 00:42:01 GMT MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $aõ%s¦%s¦%s¦s`¦s¦¦}¦s¦q=C¦?s¦Ú>y¦(s¦%r¦xs¦G`¦<s¦8y¦÷s¦8x¦s¦%s¦¤s¦âu¦$s¦Rich%s¦PEL¸õTà à€€ _ p@ð‘¯håÄphuPð!UPX0€ €àUPX1à Ò@à.rsrc€pzÖ@À
received: 1024
socket: 776
1 1024 0

recv

buffer: HTTP/1.1 200 OK content-length: 487920 last-modified: Fri, 25 Aug 2023 12:28:24 GMT content-disposition: attachment; filename="1" content-type: application/octet-stream etag: "0:771f0:64e89e68:39f2e340" accept-ranges: bytes date: Tue, 17 Oct 2023 00:42:10 GMT MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $aõ%s¦%s¦%s¦s`¦s¦¦}¦s¦q=C¦?s¦Ú>y¦(s¦%r¦xs¦G`¦<s¦8y¦÷s¦8x¦s¦%s¦¤s¦âu¦$s¦Rich%s¦PEL¸õTà à€€ _ p@ð‘¯håÄphuPð!UPX0€ €àUPX1à Ò@à.rsrc€pzÖ@À
received: 1024
socket: 820
1 1024 0

recv

buffer: HTTP/1.1 200 OK content-length: 487920 accept-ranges: bytes content-disposition: attachment; filename="1" last-modified: Fri, 25 Aug 2023 12:28:24 GMT etag: "0:771f0:64e89e68:39f2e340" content-type: application/octet-stream date: Tue, 17 Oct 2023 00:42:11 GMT MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $aõ%s¦%s¦%s¦s`¦s¦¦}¦s¦q=C¦?s¦Ú>y¦(s¦%r¦xs¦G`¦<s¦8y¦÷s¦8x¦s¦%s¦¤s¦âu¦$s¦Rich%s¦PEL¸õTà à€€ _ p@ð‘¯håÄphuPð!UPX0€ €àUPX1à Ò@à.rsrc€pzÖ@À
received: 1024
socket: 808
1 1024 0

recv

buffer: HTTP/1.1 200 OK content-length: 487920 content-disposition: attachment; filename="1" last-modified: Fri, 25 Aug 2023 12:28:24 GMT etag: "0:771f0:64e89e68:39f2e340" content-type: application/octet-stream accept-ranges: bytes date: Tue, 17 Oct 2023 00:42:14 GMT MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $aõ%s¦%s¦%s¦s`¦s¦¦}¦s¦q=C¦?s¦Ú>y¦(s¦%r¦xs¦G`¦<s¦8y¦÷s¦8x¦s¦%s¦¤s¦âu¦$s¦Rich%s¦PEL¸õTà à€€ _ p@ð‘¯håÄphuPð!UPX0€ €àUPX1à Ò@à.rsrc€pzÖ@À
received: 1024
socket: 824
1 1024 0

recv

buffer: HTTP/1.1 200 OK content-length: 487920 accept-ranges: bytes last-modified: Fri, 25 Aug 2023 12:28:24 GMT etag: "0:771f0:64e89e68:39f2e340" content-disposition: attachment; filename="1" content-type: application/octet-stream date: Tue, 17 Oct 2023 00:42:16 GMT MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $aõ%s¦%s¦%s¦s`¦s¦¦}¦s¦q=C¦?s¦Ú>y¦(s¦%r¦xs¦G`¦<s¦8y¦÷s¦8x¦s¦%s¦¤s¦âu¦$s¦Rich%s¦PEL¸õTà à€€ _ p@ð‘¯håÄphuPð!UPX0€ €àUPX1à Ò@à.rsrc€pzÖ@À
received: 1024
socket: 828
1 1024 0

recv

buffer: HTTP/1.1 200 OK content-length: 487920 accept-ranges: bytes content-disposition: attachment; filename="1" last-modified: Fri, 25 Aug 2023 12:28:24 GMT etag: "0:771f0:64e89e68:39f2e340" content-type: application/octet-stream date: Tue, 17 Oct 2023 00:42:18 GMT MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $aõ%s¦%s¦%s¦s`¦s¦¦}¦s¦q=C¦?s¦Ú>y¦(s¦%r¦xs¦G`¦<s¦8y¦÷s¦8x¦s¦%s¦¤s¦âu¦$s¦Rich%s¦PEL¸õTà à€€ _ p@ð‘¯håÄphuPð!UPX0€ €àUPX1à Ò@à.rsrc€pzÖ@À
received: 1024
socket: 824
1 1024 0

recv

buffer: HTTP/1.1 200 OK content-length: 487920 accept-ranges: bytes last-modified: Fri, 25 Aug 2023 12:28:24 GMT content-disposition: attachment; filename="1" etag: "0:771f0:64e89e68:39f2e340" content-type: application/octet-stream date: Tue, 17 Oct 2023 00:42:19 GMT MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $aõ%s¦%s¦%s¦s`¦s¦¦}¦s¦q=C¦?s¦Ú>y¦(s¦%r¦xs¦G`¦<s¦8y¦÷s¦8x¦s¦%s¦¤s¦âu¦$s¦Rich%s¦PEL¸õTà à€€ _ p@ð‘¯håÄphuPð!UPX0€ €àUPX1à Ò@à.rsrc€pzÖ@À
received: 1024
socket: 840
1 1024 0

recv

buffer: HTTP/1.1 200 OK content-length: 487920 accept-ranges: bytes last-modified: Fri, 25 Aug 2023 12:28:24 GMT content-disposition: attachment; filename="1" etag: "0:771f0:64e89e68:39f2e340" content-type: application/octet-stream date: Tue, 17 Oct 2023 00:42:22 GMT MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $aõ%s¦%s¦%s¦s`¦s¦¦}¦s¦q=C¦?s¦Ú>y¦(s¦%r¦xs¦G`¦<s¦8y¦÷s¦8x¦s¦%s¦¤s¦âu¦$s¦Rich%s¦PEL¸õTà à€€ _ p@ð‘¯håÄphuPð!UPX0€ €àUPX1à Ò@à.rsrc€pzÖ@À
received: 1024
socket: 836
1 1024 0

recv

buffer: HTTP/1.1 200 OK content-length: 487920 accept-ranges: bytes last-modified: Fri, 25 Aug 2023 12:28:24 GMT etag: "0:771f0:64e89e68:39f2e340" content-disposition: attachment; filename="1" content-type: application/octet-stream date: Tue, 17 Oct 2023 00:42:23 GMT MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $aõ%s¦%s¦%s¦s`¦s¦¦}¦s¦q=C¦?s¦Ú>y¦(s¦%r¦xs¦G`¦<s¦8y¦÷s¦8x¦s¦%s¦¤s¦âu¦$s¦Rich%s¦PEL¸õTà à€€ _ p@ð‘¯håÄphuPð!UPX0€ €àUPX1à Ò@à.rsrc€pzÖ@À
received: 1024
socket: 840
1 1024 0

recv

buffer: HTTP/1.1 200 OK content-length: 487920 etag: "0:771f0:64e89e68:39f2e340" last-modified: Fri, 25 Aug 2023 12:28:24 GMT accept-ranges: bytes content-type: application/octet-stream content-disposition: attachment; filename="1" date: Tue, 17 Oct 2023 00:42:29 GMT MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $aõ%s¦%s¦%s¦s`¦s¦¦}¦s¦q=C¦?s¦Ú>y¦(s¦%r¦xs¦G`¦<s¦8y¦÷s¦8x¦s¦%s¦¤s¦âu¦$s¦Rich%s¦PEL¸õTà à€€ _ p@ð‘¯håÄphuPð!UPX0€ €àUPX1à Ò@à.rsrc€pzÖ@À
received: 1024
socket: 824
1 1024 0

recv

buffer: HTTP/1.1 200 OK content-length: 487920 last-modified: Fri, 25 Aug 2023 12:28:24 GMT content-disposition: attachment; filename="1" content-type: application/octet-stream etag: "0:771f0:64e89e68:39f2e340" accept-ranges: bytes date: Tue, 17 Oct 2023 00:42:29 GMT MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $aõ%s¦%s¦%s¦s`¦s¦¦}¦s¦q=C¦?s¦Ú>y¦(s¦%r¦xs¦G`¦<s¦8y¦÷s¦8x¦s¦%s¦¤s¦âu¦$s¦Rich%s¦PEL¸õTà à€€ _ p@ð‘¯håÄphuPð!UPX0€ €àUPX1à Ò@à.rsrc€pzÖ@À
received: 1024
socket: 816
1 1024 0

recv

buffer: HTTP/1.1 200 OK content-length: 487920 content-type: application/octet-stream accept-ranges: bytes content-disposition: attachment; filename="1" etag: "0:771f0:64e89e68:39f2e340" last-modified: Fri, 25 Aug 2023 12:28:24 GMT date: Tue, 17 Oct 2023 00:42:30 GMT MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $aõ%s¦%s¦%s¦s`¦s¦¦}¦s¦q=C¦?s¦Ú>y¦(s¦%r¦xs¦G`¦<s¦8y¦÷s¦8x¦s¦%s¦¤s¦âu¦$s¦Rich%s¦PEL¸õTà à€€ _ p@ð‘¯håÄphuPð!UPX0€ €àUPX1à Ò@à.rsrc€pzÖ@À
received: 1024
socket: 808
1 1024 0

recv

buffer: HTTP/1.1 200 OK content-length: 487920 content-type: application/octet-stream etag: "0:771f0:64e89e68:39f2e340" content-disposition: attachment; filename="1" last-modified: Fri, 25 Aug 2023 12:28:24 GMT accept-ranges: bytes date: Tue, 17 Oct 2023 00:42:30 GMT MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $aõ%s¦%s¦%s¦s`¦s¦¦}¦s¦q=C¦?s¦Ú>y¦(s¦%r¦xs¦G`¦<s¦8y¦÷s¦8x¦s¦%s¦¤s¦âu¦$s¦Rich%s¦PEL¸õTà à€€ _ p@ð‘¯håÄphuPð!UPX0€ €àUPX1à Ò@à.rsrc€pzÖ@À
received: 1024
socket: 836
1 1024 0

recv

buffer: HTTP/1.1 200 OK content-length: 487920 accept-ranges: bytes last-modified: Fri, 25 Aug 2023 12:28:24 GMT etag: "0:771f0:64e89e68:39f2e340" content-disposition: attachment; filename="1" content-type: application/octet-stream date: Tue, 17 Oct 2023 00:42:40 GMT MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $aõ%s¦%s¦%s¦s`¦s¦¦}¦s¦q=C¦?s¦Ú>y¦(s¦%r¦xs¦G`¦<s¦8y¦÷s¦8x¦s¦%s¦¤s¦âu¦$s¦Rich%s¦PEL¸õTà à€€ _ p@ð‘¯håÄphuPð!UPX0€ €àUPX1à Ò@à.rsrc€pzÖ@À
received: 1024
socket: 820
1 1024 0

recv

buffer: HTTP/1.1 200 OK content-length: 487920 accept-ranges: bytes last-modified: Fri, 25 Aug 2023 12:28:24 GMT content-disposition: attachment; filename="1" etag: "0:771f0:64e89e68:39f2e340" content-type: application/octet-stream date: Tue, 17 Oct 2023 00:42:44 GMT MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $aõ%s¦%s¦%s¦s`¦s¦¦}¦s¦q=C¦?s¦Ú>y¦(s¦%r¦xs¦G`¦<s¦8y¦÷s¦8x¦s¦%s¦¤s¦âu¦$s¦Rich%s¦PEL¸õTà à€€ _ p@ð‘¯håÄphuPð!UPX0€ €àUPX1à Ò@à.rsrc€pzÖ@À
received: 1024
socket: 836
1 1024 0

recv

buffer: HTTP/1.1 200 OK content-length: 487920 accept-ranges: bytes last-modified: Fri, 25 Aug 2023 12:28:24 GMT etag: "0:771f0:64e89e68:39f2e340" content-disposition: attachment; filename="1" content-type: application/octet-stream date: Tue, 17 Oct 2023 00:42:44 GMT MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $aõ%s¦%s¦%s¦s`¦s¦¦}¦s¦q=C¦?s¦Ú>y¦(s¦%r¦xs¦G`¦<s¦8y¦÷s¦8x¦s¦%s¦¤s¦âu¦$s¦Rich%s¦PEL¸õTà à€€ _ p@ð‘¯håÄphuPð!UPX0€ €àUPX1à Ò@à.rsrc€pzÖ@À
received: 1024
socket: 820
1 1024 0

recv

buffer: HTTP/1.1 200 OK content-length: 487920 content-type: application/octet-stream accept-ranges: bytes content-disposition: attachment; filename="1" etag: "0:771f0:64e89e68:39f2e340" last-modified: Fri, 25 Aug 2023 12:28:24 GMT date: Tue, 17 Oct 2023 00:42:45 GMT MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $aõ%s¦%s¦%s¦s`¦s¦¦}¦s¦q=C¦?s¦Ú>y¦(s¦%r¦xs¦G`¦<s¦8y¦÷s¦8x¦s¦%s¦¤s¦âu¦$s¦Rich%s¦PEL¸õTà à€€ _ p@ð‘¯håÄphuPð!UPX0€ €àUPX1à Ò@à.rsrc€pzÖ@À
received: 1024
socket: 856
1 1024 0

recv

buffer: HTTP/1.1 200 OK content-length: 487920 accept-ranges: bytes last-modified: Fri, 25 Aug 2023 12:28:24 GMT etag: "0:771f0:64e89e68:39f2e340" content-disposition: attachment; filename="1" content-type: application/octet-stream date: Tue, 17 Oct 2023 00:42:50 GMT MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $aõ%s¦%s¦%s¦s`¦s¦¦}¦s¦q=C¦?s¦Ú>y¦(s¦%r¦xs¦G`¦<s¦8y¦÷s¦8x¦s¦%s¦¤s¦âu¦$s¦Rich%s¦PEL¸õTà à€€ _ p@ð‘¯håÄphuPð!UPX0€ €àUPX1à Ò@à.rsrc€pzÖ@À
received: 1024
socket: 820
1 1024 0

recv

buffer: HTTP/1.1 200 OK content-length: 487920 etag: "0:771f0:64e89e68:39f2e340" last-modified: Fri, 25 Aug 2023 12:28:24 GMT accept-ranges: bytes content-type: application/octet-stream content-disposition: attachment; filename="1" date: Tue, 17 Oct 2023 00:42:50 GMT MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $aõ%s¦%s¦%s¦s`¦s¦¦}¦s¦q=C¦?s¦Ú>y¦(s¦%r¦xs¦G`¦<s¦8y¦÷s¦8x¦s¦%s¦¤s¦âu¦$s¦Rich%s¦PEL¸õTà à€€ _ p@ð‘¯håÄphuPð!UPX0€ €àUPX1à Ò@à.rsrc€pzÖ@À
received: 1024
socket: 856
1 1024 0

recv

buffer: HTTP/1.1 200 OK content-length: 487920 content-type: application/octet-stream accept-ranges: bytes content-disposition: attachment; filename="1" etag: "0:771f0:64e89e68:39f2e340" last-modified: Fri, 25 Aug 2023 12:28:24 GMT date: Tue, 17 Oct 2023 00:42:51 GMT MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $aõ%s¦%s¦%s¦s`¦s¦¦}¦s¦q=C¦?s¦Ú>y¦(s¦%r¦xs¦G`¦<s¦8y¦÷s¦8x¦s¦%s¦¤s¦âu¦$s¦Rich%s¦PEL¸õTà à€€ _ p@ð‘¯håÄphuPð!UPX0€ €àUPX1à Ò@à.rsrc€pzÖ@À
received: 1024
socket: 852
1 1024 0

recv

buffer: HTTP/1.1 200 OK content-length: 487920 content-disposition: attachment; filename="1" content-type: application/octet-stream last-modified: Fri, 25 Aug 2023 12:28:24 GMT etag: "0:771f0:64e89e68:39f2e340" accept-ranges: bytes date: Tue, 17 Oct 2023 00:42:53 GMT MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $aõ%s¦%s¦%s¦s`¦s¦¦}¦s¦q=C¦?s¦Ú>y¦(s¦%r¦xs¦G`¦<s¦8y¦÷s¦8x¦s¦%s¦¤s¦âu¦$s¦Rich%s¦PEL¸õTà à€€ _ p@ð‘¯håÄphuPð!UPX0€ €àUPX1à Ò@à.rsrc€pzÖ@À
received: 1024
socket: 836
1 1024 0

recv

buffer: HTTP/1.1 200 OK content-length: 487920 content-disposition: attachment; filename="1" last-modified: Fri, 25 Aug 2023 12:28:24 GMT etag: "0:771f0:64e89e68:39f2e340" content-type: application/octet-stream accept-ranges: bytes date: Tue, 17 Oct 2023 00:42:54 GMT MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $aõ%s¦%s¦%s¦s`¦s¦¦}¦s¦q=C¦?s¦Ú>y¦(s¦%r¦xs¦G`¦<s¦8y¦÷s¦8x¦s¦%s¦¤s¦âu¦$s¦Rich%s¦PEL¸õTà à€€ _ p@ð‘¯håÄphuPð!UPX0€ €àUPX1à Ò@à.rsrc€pzÖ@À
received: 1024
socket: 828
1 1024 0

recv

buffer: HTTP/1.1 200 OK content-length: 487920 content-type: application/octet-stream etag: "0:771f0:64e89e68:39f2e340" content-disposition: attachment; filename="1" last-modified: Fri, 25 Aug 2023 12:28:24 GMT accept-ranges: bytes date: Tue, 17 Oct 2023 00:42:55 GMT MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $aõ%s¦%s¦%s¦s`¦s¦¦}¦s¦q=C¦?s¦Ú>y¦(s¦%r¦xs¦G`¦<s¦8y¦÷s¦8x¦s¦%s¦¤s¦âu¦$s¦Rich%s¦PEL¸õTà à€€ _ p@ð‘¯håÄphuPð!UPX0€ €àUPX1à Ò@à.rsrc€pzÖ@À
received: 1024
socket: 860
1 1024 0

recv

buffer: HTTP/1.1 200 OK content-length: 487920 accept-ranges: bytes last-modified: Fri, 25 Aug 2023 12:28:24 GMT content-type: application/octet-stream content-disposition: attachment; filename="1" etag: "0:771f0:64e89e68:39f2e340" date: Tue, 17 Oct 2023 00:42:55 GMT MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $aõ%s¦%s¦%s¦s`¦s¦¦}¦s¦q=C¦?s¦Ú>y¦(s¦%r¦xs¦G`¦<s¦8y¦÷s¦8x¦s¦%s¦¤s¦âu¦$s¦Rich%s¦PEL¸õTà à€€ _ p@ð‘¯håÄphuPð!UPX0€ €àUPX1à Ò@à.rsrc€pzÖ@À
received: 1024
socket: 840
1 1024 0

recv

buffer: HTTP/1.1 200 OK content-length: 487920 accept-ranges: bytes last-modified: Fri, 25 Aug 2023 12:28:24 GMT etag: "0:771f0:64e89e68:39f2e340" content-disposition: attachment; filename="1" content-type: application/octet-stream date: Tue, 17 Oct 2023 00:42:56 GMT MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $aõ%s¦%s¦%s¦s`¦s¦¦}¦s¦q=C¦?s¦Ú>y¦(s¦%r¦xs¦G`¦<s¦8y¦÷s¦8x¦s¦%s¦¤s¦âu¦$s¦Rich%s¦PEL¸õTà à€€ _ p@ð‘¯håÄphuPð!UPX0€ €àUPX1à Ò@à.rsrc€pzÖ@À
received: 1024
socket: 860
1 1024 0

recv

buffer: HTTP/1.1 200 OK content-length: 487920 accept-ranges: bytes content-disposition: attachment; filename="1" last-modified: Fri, 25 Aug 2023 12:28:24 GMT etag: "0:771f0:64e89e68:39f2e340" content-type: application/octet-stream date: Tue, 17 Oct 2023 00:42:58 GMT MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $aõ%s¦%s¦%s¦s`¦s¦¦}¦s¦q=C¦?s¦Ú>y¦(s¦%r¦xs¦G`¦<s¦8y¦÷s¦8x¦s¦%s¦¤s¦âu¦$s¦Rich%s¦PEL¸õTà à€€ _ p@ð‘¯håÄphuPð!UPX0€ €àUPX1à Ò@à.rsrc€pzÖ@À
received: 1024
socket: 840
1 1024 0

recv

buffer: HTTP/1.1 200 OK content-length: 487920 content-type: application/octet-stream content-disposition: attachment; filename="1" etag: "0:771f0:64e89e68:39f2e340" last-modified: Fri, 25 Aug 2023 12:28:24 GMT accept-ranges: bytes date: Tue, 17 Oct 2023 00:42:59 GMT MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $aõ%s¦%s¦%s¦s`¦s¦¦}¦s¦q=C¦?s¦Ú>y¦(s¦%r¦xs¦G`¦<s¦8y¦÷s¦8x¦s¦%s¦¤s¦âu¦$s¦Rich%s¦PEL¸õTà à€€ _ p@ð‘¯håÄphuPð!UPX0€ €àUPX1à Ò@à.rsrc€pzÖ@À
received: 1024
socket: 840
1 1024 0

recv

buffer: HTTP/1.1 200 OK content-length: 487920 content-type: application/octet-stream content-disposition: attachment; filename="1" etag: "0:771f0:64e89e68:39f2e340" last-modified: Fri, 25 Aug 2023 12:28:24 GMT accept-ranges: bytes date: Tue, 17 Oct 2023 00:43:08 GMT MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $aõ%s¦%s¦%s¦s`¦s¦¦}¦s¦q=C¦?s¦Ú>y¦(s¦%r¦xs¦G`¦<s¦8y¦÷s¦8x¦s¦%s¦¤s¦âu¦$s¦Rich%s¦PEL¸õTà à€€ _ p@ð‘¯håÄphuPð!UPX0€ €àUPX1à Ò@à.rsrc€pzÖ@À
received: 1024
socket: 836
1 1024 0

recv

buffer: HTTP/1.1 200 OK content-length: 487920 content-type: application/octet-stream content-disposition: attachment; filename="1" etag: "0:771f0:64e89e68:39f2e340" last-modified: Fri, 25 Aug 2023 12:28:24 GMT accept-ranges: bytes date: Tue, 17 Oct 2023 00:43:21 GMT MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $aõ%s¦%s¦%s¦s`¦s¦¦}¦s¦q=C¦?s¦Ú>y¦(s¦%r¦xs¦G`¦<s¦8y¦÷s¦8x¦s¦%s¦¤s¦âu¦$s¦Rich%s¦PEL¸õTà à€€ _ p@ð‘¯håÄphuPð!UPX0€ €àUPX1à Ò@à.rsrc€pzÖ@À
received: 1024
socket: 828
1 1024 0

recv

buffer: HTTP/1.1 200 OK content-length: 487920 etag: "0:771f0:64e89e68:39f2e340" last-modified: Fri, 25 Aug 2023 12:28:24 GMT accept-ranges: bytes content-type: application/octet-stream content-disposition: attachment; filename="1" date: Tue, 17 Oct 2023 00:43:22 GMT MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $aõ%s¦%s¦%s¦s`¦s¦¦}¦s¦q=C¦?s¦Ú>y¦(s¦%r¦xs¦G`¦<s¦8y¦÷s¦8x¦s¦%s¦¤s¦âu¦$s¦Rich%s¦PEL¸õTà à€€ _ p@ð‘¯håÄphuPð!UPX0€ €àUPX1à Ò@à.rsrc€pzÖ@À
received: 1024
socket: 840
1 1024 0

recv

buffer: HTTP/1.1 200 OK content-length: 487920 etag: "0:771f0:64e89e68:39f2e340" accept-ranges: bytes content-type: application/octet-stream last-modified: Fri, 25 Aug 2023 12:28:24 GMT content-disposition: attachment; filename="1" date: Tue, 17 Oct 2023 00:43:23 GMT MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $aõ%s¦%s¦%s¦s`¦s¦¦}¦s¦q=C¦?s¦Ú>y¦(s¦%r¦xs¦G`¦<s¦8y¦÷s¦8x¦s¦%s¦¤s¦âu¦$s¦Rich%s¦PEL¸õTà à€€ _ p@ð‘¯håÄphuPð!UPX0€ €àUPX1à Ò@à.rsrc€pzÖ@À
received: 1024
socket: 836
1 1024 0

recv

buffer: HTTP/1.1 200 OK content-length: 487920 last-modified: Fri, 25 Aug 2023 12:28:24 GMT etag: "0:771f0:64e89e68:39f2e340" accept-ranges: bytes content-type: application/octet-stream content-disposition: attachment; filename="1" date: Tue, 17 Oct 2023 00:43:25 GMT MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $aõ%s¦%s¦%s¦s`¦s¦¦}¦s¦q=C¦?s¦Ú>y¦(s¦%r¦xs¦G`¦<s¦8y¦÷s¦8x¦s¦%s¦¤s¦âu¦$s¦Rich%s¦PEL¸õTà à€€ _ p@ð‘¯håÄphuPð!UPX0€ €àUPX1à Ò@à.rsrc€pzÖ@À
received: 1024
socket: 856
1 1024 0

recv

buffer: HTTP/1.1 200 OK content-length: 487920 accept-ranges: bytes last-modified: Fri, 25 Aug 2023 12:28:24 GMT content-disposition: attachment; filename="1" content-type: application/octet-stream etag: "0:771f0:64e89e68:39f2e340" date: Tue, 17 Oct 2023 00:43:28 GMT MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $aõ%s¦%s¦%s¦s`¦s¦¦}¦s¦q=C¦?s¦Ú>y¦(s¦%r¦xs¦G`¦<s¦8y¦÷s¦8x¦s¦%s¦¤s¦âu¦$s¦Rich%s¦PEL¸õTà à€€ _ p@ð‘¯håÄphuPð!UPX0€ €àUPX1à Ò@à.rsrc€pzÖ@À
received: 1024
socket: 856
1 1024 0

recv

buffer: HTTP/1.1 200 OK content-length: 487920 last-modified: Fri, 25 Aug 2023 12:28:24 GMT etag: "0:771f0:64e89e68:39f2e340" accept-ranges: bytes content-type: application/octet-stream content-disposition: attachment; filename="1" date: Tue, 17 Oct 2023 00:43:44 GMT MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $aõ%s¦%s¦%s¦s`¦s¦¦}¦s¦q=C¦?s¦Ú>y¦(s¦%r¦xs¦G`¦<s¦8y¦÷s¦8x¦s¦%s¦¤s¦âu¦$s¦Rich%s¦PEL¸õTà à€€ _ p@ð‘¯håÄphuPð!UPX0€ €àUPX1à Ò@à.rsrc€pzÖ@À
received: 1024
socket: 828
1 1024 0

recv

buffer: HTTP/1.1 200 OK content-length: 487920 etag: "0:771f0:64e89e68:39f2e340" last-modified: Fri, 25 Aug 2023 12:28:24 GMT accept-ranges: bytes content-type: application/octet-stream content-disposition: attachment; filename="1" date: Tue, 17 Oct 2023 00:43:56 GMT MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $aõ%s¦%s¦%s¦s`¦s¦¦}¦s¦q=C¦?s¦Ú>y¦(s¦%r¦xs¦G`¦<s¦8y¦÷s¦8x¦s¦%s¦¤s¦âu¦$s¦Rich%s¦PEL¸õTà à€€ _ p@ð‘¯håÄphuPð!UPX0€ €àUPX1à Ò@à.rsrc€pzÖ@À
received: 1024
socket: 752
1 1024 0

recv

buffer: HTTP/1.1 200 OK content-length: 487920 content-disposition: attachment; filename="1" last-modified: Fri, 25 Aug 2023 12:28:24 GMT etag: "0:771f0:64e89e68:39f2e340" content-type: application/octet-stream accept-ranges: bytes date: Tue, 17 Oct 2023 00:43:56 GMT MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $aõ%s¦%s¦%s¦s`¦s¦¦}¦s¦q=C¦?s¦Ú>y¦(s¦%r¦xs¦G`¦<s¦8y¦÷s¦8x¦s¦%s¦¤s¦âu¦$s¦Rich%s¦PEL¸õTà à€€ _ p@ð‘¯håÄphuPð!UPX0€ €àUPX1à Ò@à.rsrc€pzÖ@À
received: 1024
socket: 820
1 1024 0

recv

buffer: HTTP/1.1 200 OK content-length: 487920 content-type: application/octet-stream etag: "0:771f0:64e89e68:39f2e340" content-disposition: attachment; filename="1" last-modified: Fri, 25 Aug 2023 12:28:24 GMT accept-ranges: bytes date: Tue, 17 Oct 2023 00:43:57 GMT MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $aõ%s¦%s¦%s¦s`¦s¦¦}¦s¦q=C¦?s¦Ú>y¦(s¦%r¦xs¦G`¦<s¦8y¦÷s¦8x¦s¦%s¦¤s¦âu¦$s¦Rich%s¦PEL¸õTà à€€ _ p@ð‘¯håÄphuPð!UPX0€ €àUPX1à Ò@à.rsrc€pzÖ@À
received: 1024
socket: 276
1 1024 0

recv

buffer: HTTP/1.1 200 OK content-length: 487920 accept-ranges: bytes last-modified: Fri, 25 Aug 2023 12:28:24 GMT etag: "0:771f0:64e89e68:39f2e340" content-disposition: attachment; filename="1" content-type: application/octet-stream date: Tue, 17 Oct 2023 00:43:58 GMT MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $aõ%s¦%s¦%s¦s`¦s¦¦}¦s¦q=C¦?s¦Ú>y¦(s¦%r¦xs¦G`¦<s¦8y¦÷s¦8x¦s¦%s¦¤s¦âu¦$s¦Rich%s¦PEL¸õTà à€€ _ p@ð‘¯håÄphuPð!UPX0€ €àUPX1à Ò@à.rsrc€pzÖ@À
received: 1024
socket: 840
1 1024 0
host 223.26.52.96
Bkav W32.AIDetectMalware
Lionic Trojan.Win32.Lotok.4!c
MicroWorld-eScan Trojan.GenericKD.69737176
Skyhigh BehavesLike.Win32.Trojan.lh
McAfee Artemis!2D544A42A3A0
Malwarebytes Trojan.Downloader
CrowdStrike win/malicious_confidence_100% (W)
Alibaba Backdoor:Win32/Lotok.78b57274
K7GW Trojan-Downloader ( 005ac8791 )
K7AntiVirus Trojan-Downloader ( 005ac8791 )
Arcabit Trojan.Generic.D4281AD8
Symantec ML.Attribute.HighConfidence
Elastic malicious (high confidence)
ESET-NOD32 a variant of Win32/TrojanDownloader.Agent.HHI
Cynet Malicious (score: 100)
APEX Malicious
Kaspersky HEUR:Backdoor.Win32.Lotok.gen
BitDefender Trojan.GenericKD.69737176
Avast Win32:RATX-gen [Trj]
Tencent Trojan.Win32.Agent_yh.16001053
Emsisoft Trojan.GenericKD.69737176 (B)
VIPRE Trojan.GenericKD.69737176
FireEye Generic.mg.2d544a42a3a07343
Sophos Mal/Generic-S
SentinelOne Static AI - Suspicious PE
Webroot W32.Trojan.GenKD
Varist W32/ABRisk.EMXF-3463
MAX malware (ai score=85)
Antiy-AVL Trojan[Backdoor]/Win32.Lotok
Microsoft Trojan:Win32/Wacatac.B!ml
ZoneAlarm HEUR:Backdoor.Win32.Lotok.gen
GData Trojan.GenericKD.69737176
Google Detected
AhnLab-V3 Trojan/Win.Generic.C5509670
ALYac Trojan.GenericKD.69737176
Cylance unsafe
Panda Trj/Chgt.AD
Rising Backdoor.Lotok!8.111D5 (TFE:5:JRMfPVkrx8T)
Ikarus Trojan-Downloader.Win32.Agent
MaxSecure Trojan.Malware.101018141.susgen
BitDefenderTheta Gen:NN.ZedlaF.36738.eu4@aukuV8ki
AVG Win32:RATX-gen [Trj]
DeepInstinct MALICIOUS