Summary | ZeroBOX

hn-1

Malicious Library Downloader PE32 DLL PE File
Category Machine Started Completed
FILE s1_win7_x6403_us Nov. 4, 2023, 10:31 a.m. Nov. 4, 2023, 10:42 a.m.
Size 70.5KB
Type PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
MD5 a04b173e5b0cb462684e646d91b14683
SHA256 c9a965af469f70571a191271783eb2076c2e24e12353a3ec545d8a726fef61f8
CRC32 D9AC9D10
ssdeep 768:G407txg6CVX762AORxFGPRDEEOsx3n+79Namb3GluLrXCS32Ta1NzBoFsxHv5rMx:Gd7TGAgFqoQn+mmTCuL79NzBl55rw3
Yara
  • Malicious_Library_Zero - Malicious_Library
  • Network_Downloader - File Downloader
  • PE_Header_Zero - PE File Signature
  • IsDLL - (no description)
  • IsPE32 - (no description)

Name Response Post-Analysis Lookup
No hosts contacted.
IP Address Status Action
154.211.22.56 Active Moloch
164.124.101.2 Active Moloch

Suricata Alerts

Flow SID Signature Category
TCP 192.168.56.103:49171 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49170 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49167 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49187 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 154.211.22.56:8000 -> 192.168.56.103:49163 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 192.168.56.103:49166 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49169 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 154.211.22.56:8000 -> 192.168.56.103:49188 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 192.168.56.103:49173 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49176 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49207 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49168 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49182 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49178 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49175 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49183 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49179 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49193 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49191 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49180 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49164 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49199 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49196 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49190 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 154.211.22.56:8000 -> 192.168.56.103:49165 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 192.168.56.103:49216 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49197 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49192 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49172 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49221 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49198 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49200 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49174 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49228 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49204 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49202 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49177 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49230 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49205 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49220 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49181 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49231 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49206 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49227 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49184 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49194 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49212 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49249 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49195 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49218 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49254 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49232 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49201 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49209 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49266 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49203 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49250 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49213 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49253 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49208 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49185 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49223 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49257 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49214 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49186 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 154.211.22.56:8000 -> 192.168.56.103:49258 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 192.168.56.103:49215 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49189 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49259 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49217 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49210 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49224 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49263 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49273 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49225 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49211 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49265 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49229 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49274 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49226 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49219 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49269 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49238 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49276 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49222 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49241 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49280 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49240 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49234 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49281 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49284 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49243 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49235 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49242 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49312 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49296 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49236 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49277 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49315 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49244 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49305 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49245 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49283 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49320 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49306 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49251 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49246 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49324 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49307 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49252 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49247 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49309 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49260 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49278 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49317 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49282 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49261 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49291 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49262 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49319 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49297 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 154.211.22.56:8000 -> 192.168.56.103:49264 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 192.168.56.103:49334 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49300 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49268 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49340 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49233 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49302 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49270 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49237 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49303 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49272 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49336 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49347 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49332 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49349 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49338 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49339 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49356 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49344 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49239 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49275 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49358 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49360 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49248 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49377 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49255 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49346 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49364 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49301 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49256 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49385 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49366 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49313 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49390 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49285 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49267 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49392 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49271 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49367 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49316 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49393 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49279 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49374 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49400 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 154.211.22.56:8000 -> 192.168.56.103:49287 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 192.168.56.103:49293 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49407 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49348 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49409 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49321 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49428 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49294 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49429 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49326 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49433 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49286 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49435 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49333 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49436 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49376 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49299 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49449 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49452 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49288 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49352 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49455 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49379 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49468 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49304 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49480 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49337 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49483 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49487 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49351 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49498 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49353 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49289 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49499 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49394 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49502 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49507 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49511 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49354 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49514 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49361 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49515 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49308 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49539 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49290 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49549 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49397 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49552 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49359 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49555 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49375 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49563 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49578 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49314 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49580 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 154.211.22.56:8000 -> 192.168.56.103:49380 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 192.168.56.103:49318 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49365 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49404 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49292 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49592 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49369 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49295 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49600 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49601 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49415 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49609 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49329 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49384 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49298 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49371 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49627 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49330 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49628 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49417 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49310 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49633 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49639 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49388 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49644 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49382 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49646 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49311 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49649 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49335 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49422 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49656 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49659 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49341 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49665 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49383 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49666 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49681 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49389 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49684 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49343 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49322 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49694 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 154.211.22.56:8000 -> 192.168.56.103:49423 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 192.168.56.103:49695 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49701 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49350 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49710 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49323 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49426 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49714 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49363 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49715 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49391 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49719 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49372 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49724 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49373 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49396 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49386 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49325 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49730 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49395 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49732 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49441 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49733 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49398 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49738 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49402 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49406 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49746 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49411 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49747 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49748 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49445 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49327 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49754 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49451 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49758 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49453 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49760 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49413 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49328 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49457 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49331 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49489 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 154.211.22.56:8000 -> 192.168.56.103:49420 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 192.168.56.103:49777 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49342 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49497 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49430 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49779 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49501 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49438 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49517 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49440 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49522 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49528 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49531 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49796 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49387 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49543 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49442 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49547 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49448 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49805 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49548 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49450 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49809 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49550 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49454 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49568 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49461 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49812 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49574 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49345 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49816 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49577 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49467 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49817 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49581 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49599 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49822 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49603 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49611 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49416 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49403 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49612 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49469 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49616 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49626 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49631 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49470 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49837 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49405 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49637 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49651 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49652 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49473 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49355 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49653 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49654 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49482 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49657 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49492 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49424 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49658 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49493 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49669 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49504 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49357 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49670 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49510 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49672 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 154.211.22.56:8000 -> 192.168.56.103:49525 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 192.168.56.103:49527 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49673 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49410 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49545 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49678 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49551 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49685 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49687 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49560 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49692 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49439 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49561 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49362 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49704 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49564 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49705 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49570 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49707 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49575 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49709 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 154.211.22.56:8000 -> 192.168.56.103:49418 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 192.168.56.103:49711 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49585 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49472 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49586 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49718 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49729 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49590 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49595 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49731 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49620 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49737 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49419 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49761 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49621 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49474 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49368 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49766 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49622 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49770 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49623 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49773 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 154.211.22.56:8000 -> 192.168.56.103:49629 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 192.168.56.103:49776 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49635 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49425 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49778 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49643 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49781 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49645 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49790 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49647 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49370 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49650 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49791 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49671 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49793 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49799 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49676 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49432 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49475 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49819 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49683 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49820 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49693 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49821 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49699 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49378 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49830 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49721 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49833 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49722 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49723 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49834 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49446 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49735 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49740 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49741 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49743 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49476 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49745 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49381 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49755 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49447 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49762 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49786 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49477 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49788 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49789 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49399 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49456 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 154.211.22.56:8000 -> 192.168.56.103:49792 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 192.168.56.103:49795 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49797 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49458 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49478 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49800 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49803 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49806 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49401 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49814 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49464 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49824 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49826 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49465 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49481 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49836 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49490 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49408 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49412 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49414 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49484 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49427 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49431 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49491 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49434 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49485 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49437 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49443 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49444 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49459 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49460 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49506 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49462 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49503 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49463 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49466 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49471 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49512 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49479 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49486 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49488 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49509 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49494 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49513 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49495 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49496 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49500 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49505 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49518 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49508 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49524 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49530 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49519 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49516 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49532 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49533 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49534 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49537 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49538 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49540 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49541 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49559 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49520 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49562 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49523 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49566 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49569 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49536 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49572 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49573 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49579 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49583 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49591 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49521 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49604 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49605 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49607 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49542 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49610 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49613 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49526 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49614 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49615 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49617 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49618 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49630 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 154.211.22.56:8000 -> 192.168.56.103:49529 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 192.168.56.103:49636 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49642 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49663 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49667 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49546 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49674 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49535 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49675 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49680 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49682 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49689 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49690 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49691 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49544 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49697 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49698 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49700 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49708 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49712 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49554 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49713 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49717 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49553 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49734 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49739 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49744 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 154.211.22.56:8000 -> 192.168.56.103:49571 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 192.168.56.103:49768 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49769 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49775 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49556 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49785 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49794 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49576 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 154.211.22.56:8000 -> 192.168.56.103:49798 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 192.168.56.103:49810 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49811 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49818 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49557 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49823 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49587 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49588 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49558 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49565 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49596 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49567 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49598 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49584 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49602 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49589 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49606 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49593 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49632 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49594 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49597 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49634 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49608 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49640 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49619 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49648 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49624 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49660 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49625 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49662 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49638 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49686 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49641 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49696 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49655 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49702 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49661 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49703 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49664 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49668 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49716 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49725 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49677 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 154.211.22.56:8000 -> 192.168.56.103:49679 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 192.168.56.103:49727 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49688 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49736 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49742 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49706 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49749 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49728 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49752 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49750 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49753 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49751 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49757 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49759 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49756 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49765 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49763 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49767 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49764 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49774 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49771 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49783 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49772 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49787 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49780 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49782 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49801 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49784 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49804 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 154.211.22.56:8000 -> 192.168.56.103:49808 2022050 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M1 A Network Trojan was detected
TCP 192.168.56.103:49802 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49807 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49813 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49825 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49815 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49827 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49828 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49829 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49831 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49832 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49838 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 192.168.56.103:49835 -> 154.211.22.56:8000 2221033 SURICATA HTTP Request abnormal Content-Encoding header Generic Protocol Command Decode
TCP 154.211.22.56:8000 -> 192.168.56.103:49420 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 154.211.22.56:8000 -> 192.168.56.103:49420 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 154.211.22.56:8000 -> 192.168.56.103:49420 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 154.211.22.56:8000 -> 192.168.56.103:49420 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 154.211.22.56:8000 -> 192.168.56.103:49423 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 154.211.22.56:8000 -> 192.168.56.103:49423 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 154.211.22.56:8000 -> 192.168.56.103:49423 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 154.211.22.56:8000 -> 192.168.56.103:49423 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 154.211.22.56:8000 -> 192.168.56.103:49423 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 154.211.22.56:8000 -> 192.168.56.103:49423 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 154.211.22.56:8000 -> 192.168.56.103:49423 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 154.211.22.56:8000 -> 192.168.56.103:49420 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 154.211.22.56:8000 -> 192.168.56.103:49420 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 154.211.22.56:8000 -> 192.168.56.103:49420 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 154.211.22.56:8000 -> 192.168.56.103:49798 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 154.211.22.56:8000 -> 192.168.56.103:49798 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 154.211.22.56:8000 -> 192.168.56.103:49798 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 154.211.22.56:8000 -> 192.168.56.103:49798 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 154.211.22.56:8000 -> 192.168.56.103:49798 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 154.211.22.56:8000 -> 192.168.56.103:49798 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 154.211.22.56:8000 -> 192.168.56.103:49798 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 154.211.22.56:8000 -> 192.168.56.103:49264 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 154.211.22.56:8000 -> 192.168.56.103:49264 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 154.211.22.56:8000 -> 192.168.56.103:49264 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 154.211.22.56:8000 -> 192.168.56.103:49264 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 154.211.22.56:8000 -> 192.168.56.103:49264 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 154.211.22.56:8000 -> 192.168.56.103:49264 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 154.211.22.56:8000 -> 192.168.56.103:49264 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 154.211.22.56:8000 -> 192.168.56.103:49629 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 154.211.22.56:8000 -> 192.168.56.103:49629 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 154.211.22.56:8000 -> 192.168.56.103:49629 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 154.211.22.56:8000 -> 192.168.56.103:49629 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 154.211.22.56:8000 -> 192.168.56.103:49629 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 154.211.22.56:8000 -> 192.168.56.103:49629 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 154.211.22.56:8000 -> 192.168.56.103:49629 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 154.211.22.56:8000 -> 192.168.56.103:49165 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 154.211.22.56:8000 -> 192.168.56.103:49165 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 154.211.22.56:8000 -> 192.168.56.103:49188 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 154.211.22.56:8000 -> 192.168.56.103:49165 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 154.211.22.56:8000 -> 192.168.56.103:49165 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 154.211.22.56:8000 -> 192.168.56.103:49188 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 154.211.22.56:8000 -> 192.168.56.103:49165 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 154.211.22.56:8000 -> 192.168.56.103:49188 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 154.211.22.56:8000 -> 192.168.56.103:49165 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 154.211.22.56:8000 -> 192.168.56.103:49188 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 154.211.22.56:8000 -> 192.168.56.103:49165 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 154.211.22.56:8000 -> 192.168.56.103:49188 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 154.211.22.56:8000 -> 192.168.56.103:49188 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 154.211.22.56:8000 -> 192.168.56.103:49188 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 154.211.22.56:8000 -> 192.168.56.103:49380 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 154.211.22.56:8000 -> 192.168.56.103:49380 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 154.211.22.56:8000 -> 192.168.56.103:49380 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 154.211.22.56:8000 -> 192.168.56.103:49380 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 154.211.22.56:8000 -> 192.168.56.103:49380 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 154.211.22.56:8000 -> 192.168.56.103:49380 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 154.211.22.56:8000 -> 192.168.56.103:49380 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 154.211.22.56:8000 -> 192.168.56.103:49571 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 154.211.22.56:8000 -> 192.168.56.103:49571 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 154.211.22.56:8000 -> 192.168.56.103:49571 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 154.211.22.56:8000 -> 192.168.56.103:49571 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 154.211.22.56:8000 -> 192.168.56.103:49571 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 154.211.22.56:8000 -> 192.168.56.103:49571 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 154.211.22.56:8000 -> 192.168.56.103:49571 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 154.211.22.56:8000 -> 192.168.56.103:49792 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 154.211.22.56:8000 -> 192.168.56.103:49792 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 154.211.22.56:8000 -> 192.168.56.103:49792 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 154.211.22.56:8000 -> 192.168.56.103:49792 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 154.211.22.56:8000 -> 192.168.56.103:49792 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 154.211.22.56:8000 -> 192.168.56.103:49792 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 154.211.22.56:8000 -> 192.168.56.103:49258 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 154.211.22.56:8000 -> 192.168.56.103:49792 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 154.211.22.56:8000 -> 192.168.56.103:49258 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 154.211.22.56:8000 -> 192.168.56.103:49258 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 154.211.22.56:8000 -> 192.168.56.103:49258 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 154.211.22.56:8000 -> 192.168.56.103:49258 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 154.211.22.56:8000 -> 192.168.56.103:49258 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 154.211.22.56:8000 -> 192.168.56.103:49258 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 154.211.22.56:8000 -> 192.168.56.103:49163 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 154.211.22.56:8000 -> 192.168.56.103:49163 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 154.211.22.56:8000 -> 192.168.56.103:49163 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 154.211.22.56:8000 -> 192.168.56.103:49163 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 154.211.22.56:8000 -> 192.168.56.103:49163 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 154.211.22.56:8000 -> 192.168.56.103:49163 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 154.211.22.56:8000 -> 192.168.56.103:49163 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 154.211.22.56:8000 -> 192.168.56.103:49679 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 154.211.22.56:8000 -> 192.168.56.103:49679 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 154.211.22.56:8000 -> 192.168.56.103:49679 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 154.211.22.56:8000 -> 192.168.56.103:49679 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 154.211.22.56:8000 -> 192.168.56.103:49287 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 154.211.22.56:8000 -> 192.168.56.103:49679 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 154.211.22.56:8000 -> 192.168.56.103:49679 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 154.211.22.56:8000 -> 192.168.56.103:49679 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 154.211.22.56:8000 -> 192.168.56.103:49287 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 154.211.22.56:8000 -> 192.168.56.103:49287 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 154.211.22.56:8000 -> 192.168.56.103:49287 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 154.211.22.56:8000 -> 192.168.56.103:49287 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 154.211.22.56:8000 -> 192.168.56.103:49287 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 154.211.22.56:8000 -> 192.168.56.103:49287 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 154.211.22.56:8000 -> 192.168.56.103:49529 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 154.211.22.56:8000 -> 192.168.56.103:49529 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 154.211.22.56:8000 -> 192.168.56.103:49529 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 154.211.22.56:8000 -> 192.168.56.103:49529 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 154.211.22.56:8000 -> 192.168.56.103:49529 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 154.211.22.56:8000 -> 192.168.56.103:49529 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 154.211.22.56:8000 -> 192.168.56.103:49529 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 154.211.22.56:8000 -> 192.168.56.103:49525 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 154.211.22.56:8000 -> 192.168.56.103:49525 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 154.211.22.56:8000 -> 192.168.56.103:49525 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 154.211.22.56:8000 -> 192.168.56.103:49525 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 154.211.22.56:8000 -> 192.168.56.103:49525 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 154.211.22.56:8000 -> 192.168.56.103:49525 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 154.211.22.56:8000 -> 192.168.56.103:49525 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 154.211.22.56:8000 -> 192.168.56.103:49808 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 154.211.22.56:8000 -> 192.168.56.103:49808 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 154.211.22.56:8000 -> 192.168.56.103:49808 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 154.211.22.56:8000 -> 192.168.56.103:49808 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 154.211.22.56:8000 -> 192.168.56.103:49808 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 154.211.22.56:8000 -> 192.168.56.103:49808 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 154.211.22.56:8000 -> 192.168.56.103:49808 2014520 ET INFO EXE - Served Attached HTTP Misc activity
TCP 154.211.22.56:8000 -> 192.168.56.103:49418 2018959 ET POLICY PE EXE or DLL Windows file download HTTP Potential Corporate Privacy Violation
TCP 154.211.22.56:8000 -> 192.168.56.103:49418 2019103 ET MALWARE OneLouder EXE download possibly installing Zeus P2P A Network Trojan was detected
TCP 154.211.22.56:8000 -> 192.168.56.103:49418 2022051 ET MALWARE Likely Evil EXE download from dotted Quad by MSXMLHTTP M2 A Network Trojan was detected
TCP 154.211.22.56:8000 -> 192.168.56.103:49418 2022053 ET MALWARE Likely Evil EXE download from MSXMLHTTP non-exe extension M2 A Network Trojan was detected
TCP 154.211.22.56:8000 -> 192.168.56.103:49418 2023679 ET MALWARE JS/WSF Downloader Dec 08 2016 M6 A Network Trojan was detected
TCP 154.211.22.56:8000 -> 192.168.56.103:49418 2021076 ET HUNTING SUSPICIOUS Dotted Quad Host MZ Response Potentially Bad Traffic
TCP 154.211.22.56:8000 -> 192.168.56.103:49418 2014520 ET INFO EXE - Served Attached HTTP Misc activity

Suricata TLS

No Suricata TLS

Time & API Arguments Status Return Repeated

IsDebuggerPresent

0 0
suspicious_features Connection to IP address suspicious_request GET http://154.211.22.56:8000/1
request GET http://154.211.22.56:8000/1
Time & API Arguments Status Return Repeated

NtProtectVirtualMemory

process_identifier: 2404
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x7421d000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2404
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x752e1000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2404
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x76e01000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2404
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x75931000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2404
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x741a0000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2404
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x74231000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2404
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73e31000
process_handle: 0xffffffff
1 0 0

NtProtectVirtualMemory

process_identifier: 2404
stack_dep_bypass: 0
stack_pivoted: 0
heap_dep_bypass: 0
length: 4096
protection: 64 (PAGE_EXECUTE_READWRITE)
base_address: 0x73e21000
process_handle: 0xffffffff
1 0 0
Time & API Arguments Status Return Repeated

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9933856768
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9933406208
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9933840384
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9933930496
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9933828096
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9933918208
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9933815808
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9933905920
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9933803520
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9933893632
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9933791232
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9933881344
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9933770752
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9933864960
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9933758464
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9933852672
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9933746176
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9933840384
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9933733888
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9933828096
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9933684736
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9933778944
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9933672448
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9933766656
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9933656064
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9933750272
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9933643776
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9933737984
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9933631488
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9933713408
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9933615104
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9933705216
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9933602816
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9933692928
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9933590528
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9933680640
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9933586432
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9933672448
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9933574144
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9933660160
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9933561856
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9933647872
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9933549568
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9933635584
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9933520896
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9933619200
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9933516800
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9933606912
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9933504512
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0

GetDiskFreeSpaceExW

total_number_of_free_bytes: 0
free_bytes_available: 9933594624
root_path: C:\Users\test22\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\
total_number_of_bytes: 0
1 1 0
file C:\Users\test22\AppData\Roaming\mxj6WiLgjp.exe
Time & API Arguments Status Return Repeated

recv

buffer: HTTP/1.1 200 OK content-length: 542352 etag: "0:84690:652e3ef6:3044be90" accept-ranges: bytes last-modified: Tue, 17 Oct 2023 07:59:50 GMT content-disposition: attachment; filename="1" content-type: application/octet-stream date: Sat, 04 Nov 2023 01:41:39 GMT MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $aõ%s¦%s¦%s¦s`¦s¦¦}¦s¦q=C¦?s¦Ú>y¦(s¦%r¦xs¦G`¦<s¦8y¦÷s¦8x¦s¦%s¦¤s¦âu¦$s¦Rich%s¦PEL¸õTà à@P 0>` @@€k~$uÄ@$5(UPX0P €àUPX1à` à@à.rsrc@@:ä@À
received: 1024
socket: 276
1 1024 0

recv

buffer: HTTP/1.1 200 OK content-length: 542352 last-modified: Tue, 17 Oct 2023 07:59:50 GMT content-disposition: attachment; filename="1" etag: "0:84690:652e3ef6:3044be90" accept-ranges: bytes content-type: application/octet-stream date: Sat, 04 Nov 2023 01:41:56 GMT MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $aõ%s¦%s¦%s¦s`¦s¦¦}¦s¦q=C¦?s¦Ú>y¦(s¦%r¦xs¦G`¦<s¦8y¦÷s¦8x¦s¦%s¦¤s¦âu¦$s¦Rich%s¦PEL¸õTà à@P 0>` @@€k~$uÄ@$5(UPX0P €àUPX1à` à@à.rsrc@@:ä@À
received: 1024
socket: 832
1 1024 0

recv

buffer: HTTP/1.1 200 OK content-length: 542352 accept-ranges: bytes content-type: application/octet-stream last-modified: Tue, 17 Oct 2023 07:59:50 GMT etag: "0:84690:652e3ef6:3044be90" content-disposition: attachment; filename="1" date: Sat, 04 Nov 2023 01:42:12 GMT MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $aõ%s¦%s¦%s¦s`¦s¦¦}¦s¦q=C¦?s¦Ú>y¦(s¦%r¦xs¦G`¦<s¦8y¦÷s¦8x¦s¦%s¦¤s¦âu¦$s¦Rich%s¦PEL¸õTà à@P 0>` @@€k~$uÄ@$5(UPX0P €àUPX1à` à@à.rsrc@@:ä@À
received: 1024
socket: 840
1 1024 0

recv

buffer: HTTP/1.1 200 OK content-length: 542352 etag: "0:84690:652e3ef6:3044be90" content-type: application/octet-stream content-disposition: attachment; filename="1" accept-ranges: bytes last-modified: Tue, 17 Oct 2023 07:59:50 GMT date: Sat, 04 Nov 2023 01:42:55 GMT MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $aõ%s¦%s¦%s¦s`¦s¦¦}¦s¦q=C¦?s¦Ú>y¦(s¦%r¦xs¦G`¦<s¦8y¦÷s¦8x¦s¦%s¦¤s¦âu¦$s¦Rich%s¦PEL¸õTà à@P 0>` @@€k~$uÄ@$5(UPX0P €àUPX1à` à@à.rsrc@@:ä@À
received: 1024
socket: 840
1 1024 0

recv

buffer: HTTP/1.1 200 OK content-length: 542352 etag: "0:84690:652e3ef6:3044be90" accept-ranges: bytes last-modified: Tue, 17 Oct 2023 07:59:50 GMT content-disposition: attachment; filename="1" content-type: application/octet-stream date: Sat, 04 Nov 2023 01:43:23 GMT MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $aõ%s¦%s¦%s¦s`¦s¦¦}¦s¦q=C¦?s¦Ú>y¦(s¦%r¦xs¦G`¦<s¦8y¦÷s¦8x¦s¦%s¦¤s¦âu¦$s¦Rich%s¦PEL¸õTà à@P 0>` @@€k~$uÄ@$5(UPX0P €àUPX1à` à@à.rsrc@@:ä@À
received: 1024
socket: 832
1 1024 0

recv

buffer: HTTP/1.1 200 OK content-length: 542352 accept-ranges: bytes last-modified: Tue, 17 Oct 2023 07:59:50 GMT content-disposition: attachment; filename="1" content-type: application/octet-stream etag: "0:84690:652e3ef6:3044be90" date: Sat, 04 Nov 2023 01:43:24 GMT MZÿÿ¸@º´ Í!¸LÍ!This program cannot be run in DOS mode. $aõ%s¦%s¦%s¦s`¦s¦¦}¦s¦q=C¦?s¦Ú>y¦(s¦%r¦xs¦G`¦<s¦8y¦÷s¦8x¦s¦%s¦¤s¦âu¦$s¦Rich%s¦PEL¸õTà à@P 0>` @@€k~$uÄ@$5(UPX0P €àUPX1à` à@à.rsrc@@:ä@À
received: 1024
socket: 340
1 1024 0
host 154.211.22.56
Bkav W32.AIDetectMalware
Lionic Trojan.Win32.Lotok.m!c
Elastic malicious (high confidence)
MicroWorld-eScan Gen:Variant.Doina.65070
ClamAV Win.Trojan.Doina-10012690-0
CAT-QuickHeal Trojan.IGENERIC
Skyhigh BehavesLike.Win32.NetLoader.lh
McAfee Trojan-FVWA!A04B173E5B0C
Malwarebytes Trojan.Downloader
VIPRE Gen:Variant.Doina.65070
Sangfor Trojan.Win32.Silverfox.ulgyzg
CrowdStrike win/malicious_confidence_100% (W)
BitDefender Gen:Variant.Doina.65070
K7GW Trojan-Downloader ( 005ac8791 )
K7AntiVirus Trojan-Downloader ( 005ac8791 )
Symantec ML.Attribute.HighConfidence
ESET-NOD32 a variant of Win32/TrojanDownloader.Agent.HHI
APEX Malicious
Cynet Malicious (score: 99)
Kaspersky HEUR:Backdoor.Win32.Lotok.gen
Alibaba Backdoor:Win32/Lotok.de2403e4
NANO-Antivirus Trojan.Win32.Lotok.kckclu
ViRobot Trojan.Win.Z.Lotok.72192.D
Rising Downloader.Agent!1.EC5B (CLASSIC)
Sophos Troj/DwnLd-ANC
F-Secure Trojan.TR/Dldr.Agent.cpsmb
DrWeb Trojan.DownLoader46.24420
Zillya Backdoor.Lotok.Win32.3545
TrendMicro TROJ_GEN.R002C0PJV23
FireEye Generic.mg.a04b173e5b0cb462
Emsisoft Gen:Variant.Doina.65070 (B)
Ikarus Trojan-Downloader.Win32.Agent
GData Gen:Variant.Doina.65070
Google Detected
Avira TR/Dldr.Agent.cpsmb
Antiy-AVL Trojan[Backdoor]/Win32.Lotok
Arcabit Trojan.Doina.DFE2E
ZoneAlarm HEUR:Backdoor.Win32.Lotok.gen
Microsoft Trojan:Script/Phonzy.B!ml
Varist W32/S-c71d2f7c!Eldorado
AhnLab-V3 Trojan/Win.Generic.R619293
BitDefenderTheta Gen:NN.ZedlaF.36792.eu4@aukuV8ki
ALYac Gen:Variant.Doina.65070
MAX malware (ai score=88)
DeepInstinct MALICIOUS
VBA32 Backdoor.Farfli
Cylance unsafe
Panda Trj/Genetic.gen
TrendMicro-HouseCall TROJ_GEN.R002C0PJV23
Tencent Trojan.Win32.Agent_yh.16001053