[Day 9] Malware analysis She sells C# shells by the C2shore

What HTTP User-Agent was used by the malware for its connection requests to the C2 server? What is the HTTP method used to submit the command execution output? What key is used by the malware to encrypt or decrypt the C2 data? What is the first HTTP URL used by the malware? How many seconds is the hardcoded value used by