| Category | Package | Started | Completed | Duration | Options | Log |
|---|---|---|---|---|---|---|
| FILE | generic | 2026-04-10 09:03:28 | 2026-04-10 09:04:12 | 44 seconds | Show Options | Show Log |
procdump=1
amsidump=1
2025-12-02 01:29:41,500 [root] INFO: Date set to: 20260410T02:03:28, timeout set to: 150 2026-04-10 03:03:28,015 [root] DEBUG: Starting analyzer from: C:\tmpvsvg3hfz 2026-04-10 03:03:28,015 [root] DEBUG: Storing results at: C:\OudFTIAxGD 2026-04-10 03:03:28,015 [root] DEBUG: Pipe server name: \\.\PIPE\SVzxnqaJPB 2026-04-10 03:03:28,015 [root] DEBUG: Python path: C:\olddocs 2026-04-10 03:03:28,015 [root] DEBUG: No analysis package specified, trying to detect it automagically 2026-04-10 03:03:28,015 [root] INFO: Automatically selected analysis package "generic" 2026-04-10 03:03:28,015 [root] DEBUG: Importing analysis package "generic"... 2026-04-10 03:03:28,031 [root] DEBUG: Initializing analysis package "generic"... 2026-04-10 03:03:28,031 [root] INFO: Analyzer: Package modules.packages.generic does not specify a DLL option 2026-04-10 03:03:28,031 [root] INFO: Analyzer: Package modules.packages.generic does not specify a DLL_64 option 2026-04-10 03:03:28,031 [root] INFO: Analyzer: Package modules.packages.generic does not specify a loader option 2026-04-10 03:03:28,031 [root] INFO: Analyzer: Package modules.packages.generic does not specify a loader_64 option 2026-04-10 03:03:28,078 [root] DEBUG: Importing auxiliary module "modules.auxiliary.browser"... 2026-04-10 03:03:28,078 [root] DEBUG: Importing auxiliary module "modules.auxiliary.curtain"... 2026-04-10 03:03:28,078 [root] DEBUG: Importing auxiliary module "modules.auxiliary.default_apps"... 2026-04-10 03:03:28,078 [root] DEBUG: Importing auxiliary module "modules.auxiliary.digisig"... 2026-04-10 03:03:28,109 [root] DEBUG: Importing auxiliary module "modules.auxiliary.disguise"... 2026-04-10 03:03:28,125 [root] DEBUG: Importing auxiliary module "modules.auxiliary.evtx"... 2026-04-10 03:03:28,140 [root] DEBUG: Importing auxiliary module "modules.auxiliary.fiddler"... 2026-04-10 03:03:28,140 [root] DEBUG: Importing auxiliary module "modules.auxiliary.human"... 2026-04-10 03:03:28,171 [root] DEBUG: Importing auxiliary module "modules.auxiliary.screenshots"... 2026-04-10 03:03:28,171 [lib.api.screenshot] DEBUG: Importing 'PIL.ImageChops' 2026-04-10 03:03:28,265 [lib.api.screenshot] DEBUG: Importing 'PIL.ImageGrab' 2026-04-10 03:03:28,265 [lib.api.screenshot] DEBUG: Importing 'PIL.ImageDraw' 2026-04-10 03:03:28,265 [root] DEBUG: Importing auxiliary module "modules.auxiliary.sysmon"... 2026-04-10 03:03:28,281 [root] DEBUG: Importing auxiliary module "modules.auxiliary.tlsdump"... 2026-04-10 03:03:28,281 [root] DEBUG: Importing auxiliary module "modules.auxiliary.usage"... 2026-04-10 03:03:28,281 [root] DEBUG: Initializing auxiliary module "Browser"... 2026-04-10 03:03:28,281 [root] DEBUG: Started auxiliary module Browser 2026-04-10 03:03:28,281 [root] DEBUG: Initializing auxiliary module "Curtain"... 2026-04-10 03:03:28,281 [root] DEBUG: Started auxiliary module Curtain 2026-04-10 03:03:28,281 [root] DEBUG: Initializing auxiliary module "DefaultApps"... 2026-04-10 03:03:28,328 [modules.auxiliary.default_apps] DEBUG: Getting current user SID using WinAPI 2026-04-10 03:03:28,328 [root] DEBUG: Started auxiliary module DefaultApps 2026-04-10 03:03:28,328 [root] DEBUG: Initializing auxiliary module "DigiSig"... 2026-04-10 03:03:28,328 [modules.auxiliary.digisig] INFO: signtool.exe was not found in bin/ 2026-04-10 03:03:28,328 [modules.auxiliary.digisig] INFO: dummy 2026-04-10 03:03:28,328 [modules.auxiliary.digisig] INFO: Skipping authenticode validation, unsupported analyzer package 2026-04-10 03:03:28,328 [root] DEBUG: Started auxiliary module DigiSig 2026-04-10 03:03:28,328 [root] DEBUG: Initializing auxiliary module "Disguise"... 2026-04-10 03:03:28,609 [modules.auxiliary.disguise] INFO: Setting NoRecentDocsHistory 2026-04-10 03:03:28,625 [root] WARNING: Cannot execute auxiliary module Disguise: [WinError 2] The system cannot find the file specified 2026-04-10 03:03:28,625 [root] DEBUG: Initializing auxiliary module "Evtx"... 2026-04-10 03:03:28,625 [modules.auxiliary.evtx] INFO: Loading audit policy C:\tmpvsvg3hfz\bin\auditpol.csv 2026-04-10 03:03:28,890 [modules.auxiliary.evtx] INFO: Wiping logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell 2026-04-10 03:03:29,703 [root] DEBUG: Started auxiliary module Evtx 2026-04-10 03:03:29,703 [root] DEBUG: Initializing auxiliary module "Fiddler"... 2026-04-10 03:03:29,703 [modules.auxiliary.fiddler] INFO: fiddler package: dummy 2026-04-10 03:03:29,703 [root] DEBUG: Started auxiliary module Fiddler 2026-04-10 03:03:29,703 [root] DEBUG: Initializing auxiliary module "Human"... 2026-04-10 03:03:29,718 [root] DEBUG: Started auxiliary module Human 2026-04-10 03:03:29,718 [root] DEBUG: Initializing auxiliary module "Screenshots"... 2026-04-10 03:03:29,718 [root] DEBUG: Started auxiliary module Screenshots 2026-04-10 03:03:29,718 [root] DEBUG: Initializing auxiliary module "Sysmon"... 2026-04-10 03:03:29,718 [modules.auxiliary.sysmon] INFO: Seeing if we need to update sysmon config 2026-04-10 03:03:29,734 [root] DEBUG: Started auxiliary module Sysmon 2026-04-10 03:03:29,734 [root] DEBUG: Initializing auxiliary module "TLSDumpMasterSecrets"... 2026-04-10 03:03:29,734 [modules.auxiliary.sysmon] INFO: Found Sysmon Executable 2026-04-10 03:03:29,734 [modules.auxiliary.sysmon] INFO: Found Sysmon config 2026-04-10 03:03:29,734 [modules.auxiliary.tlsdump] INFO: lsass.exe found, pid 556 2026-04-10 03:03:29,734 [lib.api.process] INFO: Monitor config for process 556: C:\tmpvsvg3hfz\dll\556.ini 2026-04-10 03:03:31,859 [modules.auxiliary.sysmon] INFO: Clearing existing sysmon logs 2026-04-10 03:03:32,750 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor 2026-04-10 03:03:32,750 [lib.api.process] INFO: Option 'amsidump' with value '1' sent to monitor 2026-04-10 03:03:32,750 [lib.api.process] INFO: Option 'disable_hook_content' with value '4' sent to monitor 2026-04-10 03:03:32,750 [lib.api.process] INFO: Option 'injection' with value '0' sent to monitor 2026-04-10 03:03:32,750 [lib.api.process] INFO: Option 'ntdll_protoect' with value '0' sent to monitor 2026-04-10 03:03:32,750 [lib.api.process] INFO: Option 'tlsdump' with value '1' sent to monitor 2026-04-10 03:03:32,750 [lib.api.process] INFO: 64-bit DLL to inject is C:\tmpvsvg3hfz\dll\dmPuthus.dll, loader C:\tmpvsvg3hfz\bin\FaolEvXi.exe 2026-04-10 03:03:32,781 [root] DEBUG: Loader: Injecting process 556 with C:\tmpvsvg3hfz\dll\dmPuthus.dll. 2026-04-10 03:03:32,828 [root] DEBUG: 556: Python path set to 'C:\olddocs'. 2026-04-10 03:03:32,828 [root] DEBUG: 556: Disabling sleep skipping. 2026-04-10 03:03:32,828 [root] DEBUG: 556: Process dumps enabled. 2026-04-10 03:03:32,828 [root] DEBUG: 556: AMSI dumping enabled. 2026-04-10 03:03:32,828 [root] DEBUG: 556: Monitor config - unrecognised key ntdll_protoect. 2026-04-10 03:03:32,828 [root] DEBUG: 556: TLS secret dump mode enabled. 2026-04-10 03:03:32,843 [root] DEBUG: 556: Monitor initialised: 64-bit capemon loaded in process 556 at 0x000007FEED0E0000, thread 404, image base 0x00000000FF650000, stack from 0x0000000002112000-0x0000000002120000 2026-04-10 03:03:32,859 [root] DEBUG: 556: Commandline: C:\Windows\system32\lsass.exe 2026-04-10 03:03:32,875 [root] DEBUG: 556: Hooked 5 out of 5 functions 2026-04-10 03:03:32,875 [root] DEBUG: InjectDllViaThread: Successfully injected Dll into process via RtlCreateUserThread. 2026-04-10 03:03:32,875 [root] DEBUG: Successfully injected DLL C:\tmpvsvg3hfz\dll\dmPuthus.dll. 2026-04-10 03:03:32,875 [lib.api.process] INFO: Injected into suspended 64-bit process with pid 556 2026-04-10 03:03:32,875 [root] DEBUG: Started auxiliary module TLSDumpMasterSecrets 2026-04-10 03:03:32,875 [root] DEBUG: Initializing auxiliary module "Usage"... 2026-04-10 03:03:32,875 [root] DEBUG: Started auxiliary module Usage 2026-04-10 03:03:35,531 [root] INFO: Restarting WMI Service 2026-04-10 03:03:39,593 [lib.api.process] INFO: Successfully executed process from path "C:\Windows\system32\cmd.exe" with arguments "/c start /wait "" "C:\Users\pgabriel\AppData\Local\Temp\foo.exe"" with pid 2060 2026-04-10 03:03:39,593 [lib.api.process] INFO: Monitor config for process 2060: C:\tmpvsvg3hfz\dll\2060.ini 2026-04-10 03:03:39,609 [lib.api.process] INFO: Option 'procdump' with value '1' sent to monitor 2026-04-10 03:03:39,609 [lib.api.process] INFO: Option 'amsidump' with value '1' sent to monitor 2026-04-10 03:03:39,609 [lib.api.process] INFO: Option 'disable_hook_content' with value '4' sent to monitor 2026-04-10 03:03:39,609 [lib.api.process] INFO: Option 'injection' with value '0' sent to monitor 2026-04-10 03:03:39,609 [lib.api.process] INFO: Option 'ntdll_protoect' with value '0' sent to monitor 2026-04-10 03:03:39,609 [lib.api.process] INFO: 32-bit DLL to inject is C:\tmpvsvg3hfz\dll\BkfVzWdE.dll, loader C:\tmpvsvg3hfz\bin\DjJbSHt.exe 2026-04-10 03:03:39,625 [root] DEBUG: Loader: Injecting process 2060 (thread 2584) with C:\tmpvsvg3hfz\dll\BkfVzWdE.dll. 2026-04-10 03:03:39,625 [root] DEBUG: InjectDllViaIAT: Successfully patched IAT. 2026-04-10 03:03:39,625 [root] DEBUG: Successfully injected DLL C:\tmpvsvg3hfz\dll\BkfVzWdE.dll. 2026-04-10 03:03:39,625 [lib.api.process] INFO: Injected into suspended 32-bit process with pid 2060 2026-04-10 03:03:41,625 [lib.api.process] INFO: Successfully resumed process with pid 2060 2026-04-10 03:03:41,687 [root] DEBUG: 2060: Python path set to 'C:\olddocs'. 2026-04-10 03:03:41,687 [root] DEBUG: 2060: Disabling sleep skipping. 2026-04-10 03:03:41,687 [root] DEBUG: 2060: Process dumps enabled. 2026-04-10 03:03:41,687 [root] DEBUG: 2060: AMSI dumping enabled. 2026-04-10 03:03:41,687 [root] DEBUG: 2060: Monitor config - unrecognised key ntdll_protoect. 2026-04-10 03:03:41,687 [root] DEBUG: 2060: Dropped file limit defaulting to 100. 2026-04-10 03:03:41,703 [root] DEBUG: 2060: YaraInit: Compiled 45 rule files 2026-04-10 03:03:41,703 [root] DEBUG: 2060: YaraInit: Compiled rules saved to file C:\tmpvsvg3hfz\data\yara\capemon.yac 2026-04-10 03:03:41,718 [root] DEBUG: 2060: YaraScan: Scanning 0x4A6D0000, size 0x4bb2e 2026-04-10 03:03:41,718 [root] DEBUG: 2060: Monitor initialised: 32-bit capemon loaded in process 2060 at 0x73b20000, thread 2584, image base 0x4a6d0000, stack from 0x333000-0x430000 2026-04-10 03:03:41,718 [root] DEBUG: 2060: Commandline: "C:\Windows\system32\cmd.exe" /c start /wait "" "C:\Users\pgabriel\AppData\Local\Temp\foo.exe" 2026-04-10 03:03:41,750 [root] WARNING: b'Unable to place hook on GetCommandLineA' 2026-04-10 03:03:41,750 [root] DEBUG: 2060: set_hooks: Unable to hook GetCommandLineA 2026-04-10 03:03:41,750 [root] WARNING: b'Unable to place hook on GetCommandLineW' 2026-04-10 03:03:41,750 [root] DEBUG: 2060: set_hooks: Unable to hook GetCommandLineW 2026-04-10 03:03:41,750 [root] DEBUG: 2060: Hooked 625 out of 627 functions 2026-04-10 03:03:41,765 [root] DEBUG: 2060: RestoreHeaders: Restored original import table. 2026-04-10 03:03:41,765 [root] INFO: Loaded monitor into process with pid 2060 2026-04-10 03:03:41,781 [root] DEBUG: 2060: caller_dispatch: Added region at 0x4A6D0000 to tracked regions list (ntdll::NtOpenThread returns to 0x4A6D732B, thread 2584). 2026-04-10 03:03:41,781 [root] DEBUG: 2060: YaraScan: Scanning 0x4A6D0000, size 0x4bb2e 2026-04-10 03:03:41,781 [root] DEBUG: 2060: ProcessImageBase: Main module image at 0x4A6D0000 unmodified (entropy change 0.000000e+00) 2026-04-10 03:03:41,796 [root] DEBUG: 2060: DLL loaded at 0x740D0000: C:\Windows\SysWOW64\ntvdm64 (0x7000 bytes). 2026-04-10 03:03:41,796 [root] DEBUG: 2060: DLL loaded at 0x72ED0000: C:\Windows\SysWOW64\VERSION (0x9000 bytes). 2026-04-10 03:03:41,796 [root] DEBUG: 2060: DLL loaded at 0x72EE0000: C:\Windows\system32\uxtheme (0x80000 bytes). 2026-04-10 03:03:41,812 [root] DEBUG: 2060: DLL loaded at 0x740B0000: C:\Windows\SysWOW64\dwmapi (0x13000 bytes). 2026-04-10 03:03:41,859 [modules.auxiliary.sysmon] INFO: Dumping sysmon logs 2026-04-10 03:03:41,968 [modules.auxiliary.human] INFO: Found button "OK", clicking it 2026-04-10 03:03:43,062 [root] DEBUG: 2060: NtTerminateProcess hook: Attempting to dump process 2060 2026-04-10 03:03:43,062 [root] DEBUG: 2060: DoProcessDump: Skipping process dump as code is identical on disk. 2026-04-10 03:03:43,078 [root] INFO: Process with pid 2060 has terminated 2026-04-10 03:03:44,703 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell 2026-04-10 03:03:45,031 [lib.common.results] INFO: File 1775815424953125000.InternetExplorer.evtx.gz size is 252, Max size: 100000000 2026-04-10 03:03:45,046 [lib.common.results] INFO: File 1775815424937500000.HardwareEvents.evtx.gz size is 214, Max size: 100000000 2026-04-10 03:03:45,046 [lib.common.results] INFO: File 1775815424953125000.KeyManagementService.evtx.gz size is 2253, Max size: 100000000 2026-04-10 03:03:45,062 [lib.common.results] INFO: File 1775815424937500000.Application.evtx.gz size is 7036, Max size: 100000000 2026-04-10 03:03:45,093 [lib.common.results] INFO: File 1775815425031250000.Setup.evtx.gz size is 244, Max size: 100000000 2026-04-10 03:03:45,109 [lib.common.results] INFO: File 1775815425031250000.OAlerts.evtx.gz size is 245, Max size: 100000000 2026-04-10 03:03:45,109 [lib.common.results] INFO: File 1775815425031250000.System.evtx.gz size is 8896, Max size: 100000000 2026-04-10 03:03:45,125 [lib.common.results] INFO: File 1775815425031250000.Security.evtx.gz size is 15205, Max size: 100000000 2026-04-10 03:03:45,140 [lib.common.results] INFO: File 1775815425093750000.WindowsPowerShell.evtx.gz size is 224, Max size: 100000000 2026-04-10 03:03:46,968 [modules.auxiliary.sysmon] INFO: Uploading sysmon/1775815426.96875.sysmon.evtx.gz to host 2026-04-10 03:03:46,968 [lib.common.results] INFO: File C:\Sysmon.evtx.gz size is 9910, Max size: 100000000 2026-04-10 03:03:49,625 [root] INFO: Process list is empty, terminating analysis 2026-04-10 03:03:50,625 [root] INFO: Created shutdown mutex 2026-04-10 03:03:51,625 [root] INFO: Shutting down package 2026-04-10 03:03:51,625 [root] INFO: Stopping auxiliary modules 2026-04-10 03:03:51,625 [modules.auxiliary.curtain] ERROR: Curtain - Error collecting PowerShell events - [WinError 6] The handle is invalid 2026-04-10 03:03:51,640 [lib.common.results] INFO: File C:\curtain.log size is 0, Max size: 100000000 2026-04-10 03:03:51,640 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell 2026-04-10 03:03:51,937 [lib.common.results] INFO: File 1775815431859375000.HardwareEvents.evtx.gz size is 214, Max size: 100000000 2026-04-10 03:03:51,937 [lib.common.results] INFO: File 1775815431875000000.KeyManagementService.evtx.gz size is 2253, Max size: 100000000 2026-04-10 03:03:51,953 [lib.common.results] INFO: File 1775815431875000000.InternetExplorer.evtx.gz size is 252, Max size: 100000000 2026-04-10 03:03:51,953 [lib.common.results] INFO: File 1775815431859375000.Application.evtx.gz size is 6964, Max size: 100000000 2026-04-10 03:03:52,000 [lib.common.results] INFO: File 1775815431937500000.Security.evtx.gz size is 7210, Max size: 100000000 2026-04-10 03:03:52,015 [lib.common.results] INFO: File 1775815431937500000.OAlerts.evtx.gz size is 245, Max size: 100000000 2026-04-10 03:03:52,031 [lib.common.results] INFO: File 1775815431953125000.System.evtx.gz size is 8625, Max size: 100000000 2026-04-10 03:03:52,031 [lib.common.results] INFO: File 1775815431937500000.Setup.evtx.gz size is 244, Max size: 100000000 2026-04-10 03:03:52,046 [lib.common.results] INFO: File 1775815432000000000.WindowsPowerShell.evtx.gz size is 224, Max size: 100000000 2026-04-10 03:03:52,843 [lib.common.results] INFO: File c:\olddocs\1775815427843.saz size is 4610, Max size: 100000000 2026-04-10 03:03:52,875 [modules.auxiliary.fiddler] ERROR: Saz log file not found in guest machine 2026-04-10 03:03:57,156 [modules.auxiliary.fiddler] ERROR: Saz log file not found in guest machine 2026-04-10 03:03:57,156 [modules.auxiliary.sysmon] INFO: Doing final sysmon log dump 2026-04-10 03:04:00,171 [modules.auxiliary.evtx] INFO: Collecting logs: Application, HardwareEvents, Internet Explorer, Key Management Service, OAlerts, Security, Setup, System, Windows PowerShell 2026-04-10 03:04:00,437 [lib.common.results] INFO: File 1775815440375000000.InternetExplorer.evtx.gz size is 252, Max size: 100000000 2026-04-10 03:04:00,453 [lib.common.results] INFO: File 1775815440375000000.HardwareEvents.evtx.gz size is 214, Max size: 100000000 2026-04-10 03:04:00,468 [lib.common.results] INFO: File 1775815440359375000.Application.evtx.gz size is 6964, Max size: 100000000 2026-04-10 03:04:00,468 [lib.common.results] INFO: File 1775815440406250000.KeyManagementService.evtx.gz size is 2253, Max size: 100000000 2026-04-10 03:04:00,484 [lib.common.results] INFO: File 1775815440437500000.OAlerts.evtx.gz size is 245, Max size: 100000000 2026-04-10 03:04:00,500 [lib.common.results] INFO: File 1775815440437500000.Security.evtx.gz size is 6922, Max size: 100000000 2026-04-10 03:04:00,515 [lib.common.results] INFO: File 1775815440437500000.Setup.evtx.gz size is 244, Max size: 100000000 2026-04-10 03:04:00,515 [lib.common.results] INFO: File 1775815440437500000.System.evtx.gz size is 8345, Max size: 100000000 2026-04-10 03:04:00,531 [lib.common.results] INFO: File 1775815440484375000.WindowsPowerShell.evtx.gz size is 224, Max size: 100000000 2026-04-10 03:04:01,984 [modules.auxiliary.sysmon] INFO: Dumping sysmon logs 2026-04-10 03:04:02,249 [modules.auxiliary.sysmon] INFO: Uploading sysmon/1775815442.2499998.sysmon.evtx.gz to host 2026-04-10 03:04:02,249 [lib.common.results] INFO: File C:\Sysmon.evtx.gz size is 11804, Max size: 100000000 2026-04-10 03:04:02,249 [root] INFO: Finishing auxiliary modules 2026-04-10 03:04:02,249 [root] INFO: Shutting down pipe server and dumping dropped files 2026-04-10 03:04:02,249 [root] WARNING: Folder at path "C:\OudFTIAxGD\debugger" does not exist, skipping 2026-04-10 03:04:02,249 [root] WARNING: Folder at path "C:\OudFTIAxGD\tlsdump" does not exist, skipping 2026-04-10 03:04:02,249 [root] INFO: Analysis completed
| Name | Label | Manager | Started On | Shutdown On | Route |
|---|---|---|---|---|---|
| win7office2k3flash2800137TWN3H103 | win7office2k3flash2800137TWN3H103 | KVM | 2026-04-10 09:03:29 | 2026-04-10 09:04:12 | internet |
| File Name | foo.exe |
|---|---|
| File Size | 3 bytes |
| File Type | ASCII text |
| MD5 | 764efa883dda1e11db47671c4a3bbd9e |
| SHA1 | 55ca6286e3e4f4fba5d0448333fa99fc5a404a73 |
| SHA256 | 98ea6e4f216f2fb4b69fff9b3a44842c38686ca685f3f55dc48c5d3fb1107be4 |
| SHA512 | d78abb0542736865f94704521609c230dac03a2f369d043ac212d6933b91410e06399e37f9c5cc88436a31737330c1c8eccb2c2f9f374d62f716432a32d50fac |
| SHA3-384 | 5bf973b46a6137ba0d8dea85c6b7388d0c0e07618da89914dc13716ec4900069119332051e29fb1be22f813a34944f7e |
| CRC32 | ED6F7A7A |
| Ssdeep | 3:wn:wn |
File
|
|
hi |
| Direct | IP | Country Name |
|---|---|---|
| Y | 8.8.8.8 [VT] | United States |
No domains contacted.
No hosts contacted.
No TCP connections recorded.
No UDP connections recorded.
No domains contacted.
No HTTP(s) requests performed.
No SMTP traffic performed.
No IRC requests performed.
No ICMP traffic performed.
No CIF Results
No Suricata Alerts
No Suricata TLS
No Suricata HTTP