Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Payment Record.exe

Overview

General Information

Sample name:Payment Record.exe
Analysis ID:1630614
MD5:dd113368367877e6e6e2c38d1793629e
SHA1:a009d3de4a591b136a2b6128fad0e00bb72cb513
SHA256:4f2274eda30670db71874bec8a27f08a103472c6dea4e1df892d621f05edaaf7
Tags:exeuser-threatcat_ch
Infos:

Detection

Lokibot
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Yara detected Lokibot
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Initial sample is a PE file and has a suspicious name
Joe Sandbox ML detected suspicious sample
Maps a DLL or memory area into another process
Switches to a custom stack to bypass stack traces
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Writes to foreign memory regions
Yara detected aPLib compressed binary
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected non-DNS traffic on DNS port
Detected potential crypto function
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Sample file is different than original file name gathered from version info
Sigma detected: Uncommon Svchost Parent Process
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • Payment Record.exe (PID: 5952 cmdline: "C:\Users\user\Desktop\Payment Record.exe" MD5: DD113368367877E6E6E2C38D1793629E)
    • svchost.exe (PID: 320 cmdline: "C:\Users\user\Desktop\Payment Record.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Loki Password Stealer (PWS), LokiBot"Loki Bot is a commodity malware sold on underground sites which is designed to steal private data from infected machines, and then submit that info to a command and control host via HTTP POST. This private data includes stored passwords, login credential information from Web browsers, and a variety of cryptocurrency wallets." - PhishMeLoki-Bot employs function hashing to obfuscate the libraries utilized. While not all functions are hashed, a vast majority of them are.Loki-Bot accepts a single argument/switch of -u that simply delays execution (sleeps) for 10 seconds. This is used when Loki-Bot is upgrading itself.The Mutex generated is the result of MD5 hashing the Machine GUID and trimming to 24-characters. For example: B7E1C2CC98066B250DDB2123.Loki-Bot creates a hidden folder within the %APPDATA% directory whose name is supplied by the 8th thru 13th characters of the Mutex. For example: %APPDATA%\ C98066\.There can be four files within the hidden %APPDATA% directory at any given time: .exe, .lck, .hdb and .kdb. They will be named after characters 13 thru 18 of the Mutex. For example: 6B250D. Below is the explanation of their purpose:FILE EXTENSIONFILE DESCRIPTION.exeA copy of the malware that will execute every time the user account is logged into.lckA lock file created when either decrypting Windows Credentials or Keylogging to prevent resource conflicts.hdbA database of hashes for data that has already been exfiltrated to the C2 server.kdbA database of keylogger data that has yet to be sent to the C2 serverIf the user is privileged, Loki-Bot sets up persistence within the registry under HKEY_LOCAL_MACHINE. If not, it sets up persistence under HKEY_CURRENT_USER.The first packet transmitted by Loki-Bot contains application data.The second packet transmitted by Loki-Bot contains decrypted Windows credentials.The third packet transmitted by Loki-Bot is the malware requesting C2 commands from the C2 server. By default, Loki-Bot will send this request out every 10 minutes after the initial packet it sent.Communications to the C2 server from the compromised host contain information about the user and system including the username, hostname, domain, screen resolution, privilege level, system architecture, and Operating System.The first WORD of the HTTP Payload represents the Loki-Bot version.The second WORD of the HTTP Payload is the Payload Type. Below is the table of identified payload types:BYTEPAYLOAD TYPE0x26Stolen Cryptocurrency Wallet0x27Stolen Application Data0x28Get C2 Commands from C2 Server0x29Stolen File0x2APOS (Point of Sale?)0x2BKeylogger Data0x2CScreenshotThe 11th byte of the HTTP Payload begins the Binary ID. This might be useful in tracking campaigns or specific threat actors. This value value is typically ckav.ru. If you come across a Binary ID that is different from this, take note!Loki-Bot encrypts both the URL and the registry key used for persistence using Triple DES encryption.The Content-Key HTTP Header value is the result of hashing the HTTP Header values that precede it. This is likely used as a protection against researchers who wish to poke and prod at Loki-Bots C2 infrastructure.Loki-Bot can accept the following instructions from the C2 Server:BYTEINSTRUCTION DESCRIPTION0x00Download EXE & Execute0x01Download DLL & Load #10x02Download DLL & Load #20x08Delete HDB File0x09Start Keylogger0x0AMine & Steal Data0x0EExit Loki-Bot0x0FUpgrade Loki-Bot0x10Change C2 Polling Frequency0x11Delete Executables & ExitSuricata SignaturesRULE SIDRULE NAME2024311ET TROJAN Loki Bot Cryptocurrency Wallet Exfiltration Detected2024312ET TROJAN Loki Bot Application/Credential Data Exfiltration Detected M12024313ET TROJAN Loki Bot Request for C2 Commands Detected M12024314ET TROJAN Loki Bot File Exfiltration Detected2024315ET TROJAN Loki Bot Keylogger Data Exfiltration Detected M12024316ET TROJAN Loki Bot Screenshot Exfiltration Detected2024317ET TROJAN Loki Bot Application/Credential Data Exfiltration Detected M22024318ET TROJAN Loki Bot Request for C2 Commands Detected M22024319ET TROJAN Loki Bot Keylogger Data Exfiltration Detected M2
  • SWEED
  • The Gorgon Group
  • Cobalt
https://malpedia.caad.fkie.fraunhofer.de/details/win.lokipws
{"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php"]}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_Lokibot_1Yara detected LokibotJoe Security
    SourceRuleDescriptionAuthorStrings
    00000002.00000002.3366643257.0000000003000000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_Lokibot_1Yara detected LokibotJoe Security
      00000000.00000002.2129598847.0000000001080000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_LokibotYara detected LokibotJoe Security
        00000000.00000002.2129598847.0000000001080000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
          00000000.00000002.2129598847.0000000001080000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            00000000.00000002.2129598847.0000000001080000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_Lokibot_1f885282unknownunknown
            • 0x173f0:$a1: MAC=%02X%02X%02XINSTALL=%08X%08Xk
            Click to see the 20 entries
            SourceRuleDescriptionAuthorStrings
            0.2.Payment Record.exe.1080000.1.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
              0.2.Payment Record.exe.1080000.1.unpackWindows_Trojan_Lokibot_1f885282unknownunknown
              • 0x15ff0:$a1: MAC=%02X%02X%02XINSTALL=%08X%08Xk
              0.2.Payment Record.exe.1080000.1.unpackWindows_Trojan_Lokibot_0f421617unknownunknown
              • 0x3bbb:$a: 08 8B CE 0F B6 14 38 D3 E2 83 C1 08 03 F2 48 79 F2 5F 8B C6
              0.2.Payment Record.exe.1080000.1.unpackLoki_1Loki Payloadkevoreilly
              • 0x131b4:$a1: DlRycq1tP2vSeaogj5bEUFzQiHT9dmKCn6uf7xsOY0hpwr43VINX8JGBAkLMZW
              • 0x133fc:$a2: last_compatible_version
              0.2.Payment Record.exe.1080000.1.unpackLokibotdetect Lokibot in memoryJPCERT/CC Incident Response Group
              • 0x123ff:$des3: 68 03 66 00 00
              • 0x15ff0:$param: MAC=%02X%02X%02XINSTALL=%08X%08X
              • 0x160bc:$string: 2D 00 75 00 00 00 46 75 63 6B 61 76 2E 72 75 00 00
              Click to see the 24 entries

              System Summary

              barindex
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\Desktop\Payment Record.exe", CommandLine: "C:\Users\user\Desktop\Payment Record.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\Payment Record.exe", ParentImage: C:\Users\user\Desktop\Payment Record.exe, ParentProcessId: 5952, ParentProcessName: Payment Record.exe, ProcessCommandLine: "C:\Users\user\Desktop\Payment Record.exe", ProcessId: 320, ProcessName: svchost.exe
              Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\Desktop\Payment Record.exe", CommandLine: "C:\Users\user\Desktop\Payment Record.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\Payment Record.exe", ParentImage: C:\Users\user\Desktop\Payment Record.exe, ParentProcessId: 5952, ParentProcessName: Payment Record.exe, ProcessCommandLine: "C:\Users\user\Desktop\Payment Record.exe", ProcessId: 320, ProcessName: svchost.exe
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-03-06T04:03:46.500574+010020243121A Network Trojan was detected192.168.2.649709104.21.16.180TCP
              2025-03-06T04:03:48.473141+010020243121A Network Trojan was detected192.168.2.649710104.21.16.180TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-03-06T04:03:45.735358+010020253811Malware Command and Control Activity Detected192.168.2.649709104.21.16.180TCP
              2025-03-06T04:03:47.665765+010020253811Malware Command and Control Activity Detected192.168.2.649710104.21.16.180TCP
              2025-03-06T04:03:48.542508+010020253811Malware Command and Control Activity Detected192.168.2.649711104.21.16.180TCP
              2025-03-06T04:03:50.566688+010020253811Malware Command and Control Activity Detected192.168.2.649713104.21.16.180TCP
              2025-03-06T04:03:52.446459+010020253811Malware Command and Control Activity Detected192.168.2.649714104.21.16.180TCP
              2025-03-06T04:03:54.361622+010020253811Malware Command and Control Activity Detected192.168.2.649720104.21.16.180TCP
              2025-03-06T04:03:56.390014+010020253811Malware Command and Control Activity Detected192.168.2.649726104.21.16.180TCP
              2025-03-06T04:03:58.316473+010020253811Malware Command and Control Activity Detected192.168.2.649732104.21.16.180TCP
              2025-03-06T04:04:00.195263+010020253811Malware Command and Control Activity Detected192.168.2.649737104.21.16.180TCP
              2025-03-06T04:04:02.151058+010020253811Malware Command and Control Activity Detected192.168.2.649742104.21.16.180TCP
              2025-03-06T04:04:04.265359+010020253811Malware Command and Control Activity Detected192.168.2.649749104.21.16.180TCP
              2025-03-06T04:04:06.201744+010020253811Malware Command and Control Activity Detected192.168.2.649755104.21.16.180TCP
              2025-03-06T04:04:08.125482+010020253811Malware Command and Control Activity Detected192.168.2.649761104.21.16.180TCP
              2025-03-06T04:04:10.062674+010020253811Malware Command and Control Activity Detected192.168.2.649766104.21.16.180TCP
              2025-03-06T04:04:11.988824+010020253811Malware Command and Control Activity Detected192.168.2.649768104.21.16.180TCP
              2025-03-06T04:04:13.900262+010020253811Malware Command and Control Activity Detected192.168.2.649774104.21.16.180TCP
              2025-03-06T04:04:15.812629+010020253811Malware Command and Control Activity Detected192.168.2.649780104.21.16.180TCP
              2025-03-06T04:04:17.719575+010020253811Malware Command and Control Activity Detected192.168.2.649786104.21.16.180TCP
              2025-03-06T04:04:19.687413+010020253811Malware Command and Control Activity Detected192.168.2.649790104.21.16.180TCP
              2025-03-06T04:04:21.613325+010020253811Malware Command and Control Activity Detected192.168.2.649793104.21.16.180TCP
              2025-03-06T04:04:23.536257+010020253811Malware Command and Control Activity Detected192.168.2.649799104.21.16.180TCP
              2025-03-06T04:04:25.425745+010020253811Malware Command and Control Activity Detected192.168.2.649805104.21.16.180TCP
              2025-03-06T04:04:27.347257+010020253811Malware Command and Control Activity Detected192.168.2.649810104.21.16.180TCP
              2025-03-06T04:04:29.224142+010020253811Malware Command and Control Activity Detected192.168.2.659051104.21.16.180TCP
              2025-03-06T04:04:31.359423+010020253811Malware Command and Control Activity Detected192.168.2.659055104.21.16.180TCP
              2025-03-06T04:04:33.266425+010020253811Malware Command and Control Activity Detected192.168.2.659060104.21.16.180TCP
              2025-03-06T04:04:35.188451+010020253811Malware Command and Control Activity Detected192.168.2.659066104.21.16.180TCP
              2025-03-06T04:04:37.317190+010020253811Malware Command and Control Activity Detected192.168.2.659071104.21.16.180TCP
              2025-03-06T04:04:39.236859+010020253811Malware Command and Control Activity Detected192.168.2.659077104.21.16.180TCP
              2025-03-06T04:04:41.158663+010020253811Malware Command and Control Activity Detected192.168.2.659081104.21.16.180TCP
              2025-03-06T04:04:43.126252+010020253811Malware Command and Control Activity Detected192.168.2.659086104.21.16.180TCP
              2025-03-06T04:04:45.054916+010020253811Malware Command and Control Activity Detected192.168.2.659091104.21.16.180TCP
              2025-03-06T04:04:47.227160+010020253811Malware Command and Control Activity Detected192.168.2.659096104.21.16.180TCP
              2025-03-06T04:04:49.029554+010020253811Malware Command and Control Activity Detected192.168.2.659102104.21.16.180TCP
              2025-03-06T04:04:51.034762+010020253811Malware Command and Control Activity Detected192.168.2.659107104.21.16.180TCP
              2025-03-06T04:04:52.984767+010020253811Malware Command and Control Activity Detected192.168.2.659111104.21.16.180TCP
              2025-03-06T04:04:54.931565+010020253811Malware Command and Control Activity Detected192.168.2.659116104.21.16.180TCP
              2025-03-06T04:04:56.957167+010020253811Malware Command and Control Activity Detected192.168.2.659121104.21.16.180TCP
              2025-03-06T04:04:58.912947+010020253811Malware Command and Control Activity Detected192.168.2.659127104.21.16.180TCP
              2025-03-06T04:05:00.845623+010020253811Malware Command and Control Activity Detected192.168.2.659131104.21.16.180TCP
              2025-03-06T04:05:02.800675+010020253811Malware Command and Control Activity Detected192.168.2.659136104.21.16.180TCP
              2025-03-06T04:05:04.838430+010020253811Malware Command and Control Activity Detected192.168.2.659142104.21.16.180TCP
              2025-03-06T04:05:06.783994+010020253811Malware Command and Control Activity Detected192.168.2.659147104.21.16.180TCP
              2025-03-06T04:05:08.672822+010020253811Malware Command and Control Activity Detected192.168.2.659152104.21.16.180TCP
              2025-03-06T04:05:10.548245+010020253811Malware Command and Control Activity Detected192.168.2.659156104.21.16.180TCP
              2025-03-06T04:05:12.425406+010020253811Malware Command and Control Activity Detected192.168.2.659161104.21.16.180TCP
              2025-03-06T04:05:14.378001+010020253811Malware Command and Control Activity Detected192.168.2.659167104.21.16.180TCP
              2025-03-06T04:05:16.332459+010020253811Malware Command and Control Activity Detected192.168.2.659171104.21.16.180TCP
              2025-03-06T04:05:18.189655+010020253811Malware Command and Control Activity Detected192.168.2.659176104.21.16.180TCP
              2025-03-06T04:05:20.069802+010020253811Malware Command and Control Activity Detected192.168.2.659181104.21.16.180TCP
              2025-03-06T04:05:22.004551+010020253811Malware Command and Control Activity Detected192.168.2.659186104.21.16.180TCP
              2025-03-06T04:05:23.925500+010020253811Malware Command and Control Activity Detected192.168.2.659191104.21.16.180TCP
              2025-03-06T04:05:25.862053+010020253811Malware Command and Control Activity Detected192.168.2.659196104.21.16.180TCP
              2025-03-06T04:05:27.738975+010020253811Malware Command and Control Activity Detected192.168.2.659202104.21.16.180TCP
              2025-03-06T04:05:29.713587+010020253811Malware Command and Control Activity Detected192.168.2.659206104.21.16.180TCP
              2025-03-06T04:05:31.626941+010020253811Malware Command and Control Activity Detected192.168.2.659212104.21.16.180TCP
              2025-03-06T04:05:33.509861+010020253811Malware Command and Control Activity Detected192.168.2.659216104.21.16.180TCP
              2025-03-06T04:05:35.331358+010020253811Malware Command and Control Activity Detected192.168.2.659221104.21.16.180TCP
              2025-03-06T04:05:37.592679+010020253811Malware Command and Control Activity Detected192.168.2.659227104.21.16.180TCP
              2025-03-06T04:05:39.502540+010020253811Malware Command and Control Activity Detected192.168.2.659231104.21.16.180TCP
              2025-03-06T04:05:41.440392+010020253811Malware Command and Control Activity Detected192.168.2.659237104.21.16.180TCP
              2025-03-06T04:05:43.331199+010020253811Malware Command and Control Activity Detected192.168.2.659240104.21.16.180TCP
              2025-03-06T04:05:45.266738+010020253811Malware Command and Control Activity Detected192.168.2.659246104.21.16.180TCP
              2025-03-06T04:05:47.164818+010020253811Malware Command and Control Activity Detected192.168.2.659251104.21.16.180TCP
              2025-03-06T04:05:48.954382+010020253811Malware Command and Control Activity Detected192.168.2.659256104.21.16.180TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-03-06T04:03:53.206639+010020254831A Network Trojan was detected104.21.16.180192.168.2.649714TCP
              2025-03-06T04:03:55.128414+010020254831A Network Trojan was detected104.21.16.180192.168.2.649720TCP
              2025-03-06T04:03:57.153017+010020254831A Network Trojan was detected104.21.16.180192.168.2.649726TCP
              2025-03-06T04:04:00.981839+010020254831A Network Trojan was detected104.21.16.180192.168.2.649737TCP
              2025-03-06T04:04:02.979119+010020254831A Network Trojan was detected104.21.16.180192.168.2.649742TCP
              2025-03-06T04:04:05.048261+010020254831A Network Trojan was detected104.21.16.180192.168.2.649749TCP
              2025-03-06T04:04:08.920417+010020254831A Network Trojan was detected104.21.16.180192.168.2.649761TCP
              2025-03-06T04:04:10.832410+010020254831A Network Trojan was detected104.21.16.180192.168.2.649766TCP
              2025-03-06T04:04:12.623158+010020254831A Network Trojan was detected104.21.16.180192.168.2.649768TCP
              2025-03-06T04:04:20.463127+010020254831A Network Trojan was detected104.21.16.180192.168.2.649790TCP
              2025-03-06T04:04:22.379707+010020254831A Network Trojan was detected104.21.16.180192.168.2.649793TCP
              2025-03-06T04:04:26.196280+010020254831A Network Trojan was detected104.21.16.180192.168.2.649805TCP
              2025-03-06T04:04:29.994388+010020254831A Network Trojan was detected104.21.16.180192.168.2.659051TCP
              2025-03-06T04:04:32.116545+010020254831A Network Trojan was detected104.21.16.180192.168.2.659055TCP
              2025-03-06T04:04:34.040572+010020254831A Network Trojan was detected104.21.16.180192.168.2.659060TCP
              2025-03-06T04:04:35.973703+010020254831A Network Trojan was detected104.21.16.180192.168.2.659066TCP
              2025-03-06T04:04:38.081835+010020254831A Network Trojan was detected104.21.16.180192.168.2.659071TCP
              2025-03-06T04:04:40.014611+010020254831A Network Trojan was detected104.21.16.180192.168.2.659077TCP
              2025-03-06T04:04:41.963221+010020254831A Network Trojan was detected104.21.16.180192.168.2.659081TCP
              2025-03-06T04:04:43.899531+010020254831A Network Trojan was detected104.21.16.180192.168.2.659086TCP
              2025-03-06T04:04:45.898203+010020254831A Network Trojan was detected104.21.16.180192.168.2.659091TCP
              2025-03-06T04:04:49.804375+010020254831A Network Trojan was detected104.21.16.180192.168.2.659102TCP
              2025-03-06T04:04:51.836152+010020254831A Network Trojan was detected104.21.16.180192.168.2.659107TCP
              2025-03-06T04:04:53.749776+010020254831A Network Trojan was detected104.21.16.180192.168.2.659111TCP
              2025-03-06T04:04:57.741257+010020254831A Network Trojan was detected104.21.16.180192.168.2.659121TCP
              2025-03-06T04:04:59.684920+010020254831A Network Trojan was detected104.21.16.180192.168.2.659127TCP
              2025-03-06T04:05:01.627898+010020254831A Network Trojan was detected104.21.16.180192.168.2.659131TCP
              2025-03-06T04:05:03.589656+010020254831A Network Trojan was detected104.21.16.180192.168.2.659136TCP
              2025-03-06T04:05:05.610256+010020254831A Network Trojan was detected104.21.16.180192.168.2.659142TCP
              2025-03-06T04:05:13.221706+010020254831A Network Trojan was detected104.21.16.180192.168.2.659161TCP
              2025-03-06T04:05:15.159966+010020254831A Network Trojan was detected104.21.16.180192.168.2.659167TCP
              2025-03-06T04:05:17.004937+010020254831A Network Trojan was detected104.21.16.180192.168.2.659171TCP
              2025-03-06T04:05:20.847807+010020254831A Network Trojan was detected104.21.16.180192.168.2.659181TCP
              2025-03-06T04:05:22.754441+010020254831A Network Trojan was detected104.21.16.180192.168.2.659186TCP
              2025-03-06T04:05:28.534571+010020254831A Network Trojan was detected104.21.16.180192.168.2.659202TCP
              2025-03-06T04:05:34.176973+010020254831A Network Trojan was detected104.21.16.180192.168.2.659216TCP
              2025-03-06T04:05:40.269512+010020254831A Network Trojan was detected104.21.16.180192.168.2.659231TCP
              2025-03-06T04:05:44.099082+010020254831A Network Trojan was detected104.21.16.180192.168.2.659240TCP
              2025-03-06T04:05:47.798850+010020254831A Network Trojan was detected104.21.16.180192.168.2.659251TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-03-06T04:03:49.277970+010020243131Malware Command and Control Activity Detected192.168.2.649711104.21.16.180TCP
              2025-03-06T04:03:51.278511+010020243131Malware Command and Control Activity Detected192.168.2.649713104.21.16.180TCP
              2025-03-06T04:03:53.201624+010020243131Malware Command and Control Activity Detected192.168.2.649714104.21.16.180TCP
              2025-03-06T04:03:55.123302+010020243131Malware Command and Control Activity Detected192.168.2.649720104.21.16.180TCP
              2025-03-06T04:03:57.147922+010020243131Malware Command and Control Activity Detected192.168.2.649726104.21.16.180TCP
              2025-03-06T04:03:59.026601+010020243131Malware Command and Control Activity Detected192.168.2.649732104.21.16.180TCP
              2025-03-06T04:04:00.976832+010020243131Malware Command and Control Activity Detected192.168.2.649737104.21.16.180TCP
              2025-03-06T04:04:02.919705+010020243131Malware Command and Control Activity Detected192.168.2.649742104.21.16.180TCP
              2025-03-06T04:04:05.043190+010020243131Malware Command and Control Activity Detected192.168.2.649749104.21.16.180TCP
              2025-03-06T04:04:06.955414+010020243131Malware Command and Control Activity Detected192.168.2.649755104.21.16.180TCP
              2025-03-06T04:04:08.915335+010020243131Malware Command and Control Activity Detected192.168.2.649761104.21.16.180TCP
              2025-03-06T04:04:10.827213+010020243131Malware Command and Control Activity Detected192.168.2.649766104.21.16.180TCP
              2025-03-06T04:04:12.615447+010020243131Malware Command and Control Activity Detected192.168.2.649768104.21.16.180TCP
              2025-03-06T04:04:14.615177+010020243131Malware Command and Control Activity Detected192.168.2.649774104.21.16.180TCP
              2025-03-06T04:04:16.574300+010020243131Malware Command and Control Activity Detected192.168.2.649780104.21.16.180TCP
              2025-03-06T04:04:18.464485+010020243131Malware Command and Control Activity Detected192.168.2.649786104.21.16.180TCP
              2025-03-06T04:04:20.458147+010020243131Malware Command and Control Activity Detected192.168.2.649790104.21.16.180TCP
              2025-03-06T04:04:22.374598+010020243131Malware Command and Control Activity Detected192.168.2.649793104.21.16.180TCP
              2025-03-06T04:04:24.265165+010020243131Malware Command and Control Activity Detected192.168.2.649799104.21.16.180TCP
              2025-03-06T04:04:26.191302+010020243131Malware Command and Control Activity Detected192.168.2.649805104.21.16.180TCP
              2025-03-06T04:04:28.066550+010020243131Malware Command and Control Activity Detected192.168.2.649810104.21.16.180TCP
              2025-03-06T04:04:29.989301+010020243131Malware Command and Control Activity Detected192.168.2.659051104.21.16.180TCP
              2025-03-06T04:04:32.111462+010020243131Malware Command and Control Activity Detected192.168.2.659055104.21.16.180TCP
              2025-03-06T04:04:34.035641+010020243131Malware Command and Control Activity Detected192.168.2.659060104.21.16.180TCP
              2025-03-06T04:04:35.968671+010020243131Malware Command and Control Activity Detected192.168.2.659066104.21.16.180TCP
              2025-03-06T04:04:38.076811+010020243131Malware Command and Control Activity Detected192.168.2.659071104.21.16.180TCP
              2025-03-06T04:04:40.007493+010020243131Malware Command and Control Activity Detected192.168.2.659077104.21.16.180TCP
              2025-03-06T04:04:41.958238+010020243131Malware Command and Control Activity Detected192.168.2.659081104.21.16.180TCP
              2025-03-06T04:04:43.894501+010020243131Malware Command and Control Activity Detected192.168.2.659086104.21.16.180TCP
              2025-03-06T04:04:45.893186+010020243131Malware Command and Control Activity Detected192.168.2.659091104.21.16.180TCP
              2025-03-06T04:04:47.864446+010020243131Malware Command and Control Activity Detected192.168.2.659096104.21.16.180TCP
              2025-03-06T04:04:49.798766+010020243131Malware Command and Control Activity Detected192.168.2.659102104.21.16.180TCP
              2025-03-06T04:04:51.831104+010020243131Malware Command and Control Activity Detected192.168.2.659107104.21.16.180TCP
              2025-03-06T04:04:53.744678+010020243131Malware Command and Control Activity Detected192.168.2.659111104.21.16.180TCP
              2025-03-06T04:04:55.670227+010020243131Malware Command and Control Activity Detected192.168.2.659116104.21.16.180TCP
              2025-03-06T04:04:57.736115+010020243131Malware Command and Control Activity Detected192.168.2.659121104.21.16.180TCP
              2025-03-06T04:04:59.679668+010020243131Malware Command and Control Activity Detected192.168.2.659127104.21.16.180TCP
              2025-03-06T04:05:01.622844+010020243131Malware Command and Control Activity Detected192.168.2.659131104.21.16.180TCP
              2025-03-06T04:05:03.571742+010020243131Malware Command and Control Activity Detected192.168.2.659136104.21.16.180TCP
              2025-03-06T04:05:05.605287+010020243131Malware Command and Control Activity Detected192.168.2.659142104.21.16.180TCP
              2025-03-06T04:05:07.510252+010020243131Malware Command and Control Activity Detected192.168.2.659147104.21.16.180TCP
              2025-03-06T04:05:09.393749+010020243131Malware Command and Control Activity Detected192.168.2.659152104.21.16.180TCP
              2025-03-06T04:05:11.269029+010020243131Malware Command and Control Activity Detected192.168.2.659156104.21.16.180TCP
              2025-03-06T04:05:13.216697+010020243131Malware Command and Control Activity Detected192.168.2.659161104.21.16.180TCP
              2025-03-06T04:05:15.154899+010020243131Malware Command and Control Activity Detected192.168.2.659167104.21.16.180TCP
              2025-03-06T04:05:16.999755+010020243131Malware Command and Control Activity Detected192.168.2.659171104.21.16.180TCP
              2025-03-06T04:05:18.916004+010020243131Malware Command and Control Activity Detected192.168.2.659176104.21.16.180TCP
              2025-03-06T04:05:20.842730+010020243131Malware Command and Control Activity Detected192.168.2.659181104.21.16.180TCP
              2025-03-06T04:05:22.749374+010020243131Malware Command and Control Activity Detected192.168.2.659186104.21.16.180TCP
              2025-03-06T04:05:24.651542+010020243131Malware Command and Control Activity Detected192.168.2.659191104.21.16.180TCP
              2025-03-06T04:05:26.585069+010020243131Malware Command and Control Activity Detected192.168.2.659196104.21.16.180TCP
              2025-03-06T04:05:28.528928+010020243131Malware Command and Control Activity Detected192.168.2.659202104.21.16.180TCP
              2025-03-06T04:05:30.451853+010020243131Malware Command and Control Activity Detected192.168.2.659206104.21.16.180TCP
              2025-03-06T04:05:32.347939+010020243131Malware Command and Control Activity Detected192.168.2.659212104.21.16.180TCP
              2025-03-06T04:05:34.171856+010020243131Malware Command and Control Activity Detected192.168.2.659216104.21.16.180TCP
              2025-03-06T04:05:36.055463+010020243131Malware Command and Control Activity Detected192.168.2.659221104.21.16.180TCP
              2025-03-06T04:05:38.318964+010020243131Malware Command and Control Activity Detected192.168.2.659227104.21.16.180TCP
              2025-03-06T04:05:40.264229+010020243131Malware Command and Control Activity Detected192.168.2.659231104.21.16.180TCP
              2025-03-06T04:05:42.171346+010020243131Malware Command and Control Activity Detected192.168.2.659237104.21.16.180TCP
              2025-03-06T04:05:44.093985+010020243131Malware Command and Control Activity Detected192.168.2.659240104.21.16.180TCP
              2025-03-06T04:05:45.983520+010020243131Malware Command and Control Activity Detected192.168.2.659246104.21.16.180TCP
              2025-03-06T04:05:47.793845+010020243131Malware Command and Control Activity Detected192.168.2.659251104.21.16.180TCP
              2025-03-06T04:05:49.673289+010020243131Malware Command and Control Activity Detected192.168.2.659256104.21.16.180TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-03-06T04:03:45.735358+010020216411A Network Trojan was detected192.168.2.649709104.21.16.180TCP
              2025-03-06T04:03:47.665765+010020216411A Network Trojan was detected192.168.2.649710104.21.16.180TCP
              2025-03-06T04:03:48.542508+010020216411A Network Trojan was detected192.168.2.649711104.21.16.180TCP
              2025-03-06T04:03:50.566688+010020216411A Network Trojan was detected192.168.2.649713104.21.16.180TCP
              2025-03-06T04:03:52.446459+010020216411A Network Trojan was detected192.168.2.649714104.21.16.180TCP
              2025-03-06T04:03:54.361622+010020216411A Network Trojan was detected192.168.2.649720104.21.16.180TCP
              2025-03-06T04:03:56.390014+010020216411A Network Trojan was detected192.168.2.649726104.21.16.180TCP
              2025-03-06T04:03:58.316473+010020216411A Network Trojan was detected192.168.2.649732104.21.16.180TCP
              2025-03-06T04:04:00.195263+010020216411A Network Trojan was detected192.168.2.649737104.21.16.180TCP
              2025-03-06T04:04:02.151058+010020216411A Network Trojan was detected192.168.2.649742104.21.16.180TCP
              2025-03-06T04:04:04.265359+010020216411A Network Trojan was detected192.168.2.649749104.21.16.180TCP
              2025-03-06T04:04:06.201744+010020216411A Network Trojan was detected192.168.2.649755104.21.16.180TCP
              2025-03-06T04:04:08.125482+010020216411A Network Trojan was detected192.168.2.649761104.21.16.180TCP
              2025-03-06T04:04:10.062674+010020216411A Network Trojan was detected192.168.2.649766104.21.16.180TCP
              2025-03-06T04:04:11.988824+010020216411A Network Trojan was detected192.168.2.649768104.21.16.180TCP
              2025-03-06T04:04:13.900262+010020216411A Network Trojan was detected192.168.2.649774104.21.16.180TCP
              2025-03-06T04:04:15.812629+010020216411A Network Trojan was detected192.168.2.649780104.21.16.180TCP
              2025-03-06T04:04:17.719575+010020216411A Network Trojan was detected192.168.2.649786104.21.16.180TCP
              2025-03-06T04:04:19.687413+010020216411A Network Trojan was detected192.168.2.649790104.21.16.180TCP
              2025-03-06T04:04:21.613325+010020216411A Network Trojan was detected192.168.2.649793104.21.16.180TCP
              2025-03-06T04:04:23.536257+010020216411A Network Trojan was detected192.168.2.649799104.21.16.180TCP
              2025-03-06T04:04:25.425745+010020216411A Network Trojan was detected192.168.2.649805104.21.16.180TCP
              2025-03-06T04:04:27.347257+010020216411A Network Trojan was detected192.168.2.649810104.21.16.180TCP
              2025-03-06T04:04:29.224142+010020216411A Network Trojan was detected192.168.2.659051104.21.16.180TCP
              2025-03-06T04:04:31.359423+010020216411A Network Trojan was detected192.168.2.659055104.21.16.180TCP
              2025-03-06T04:04:33.266425+010020216411A Network Trojan was detected192.168.2.659060104.21.16.180TCP
              2025-03-06T04:04:35.188451+010020216411A Network Trojan was detected192.168.2.659066104.21.16.180TCP
              2025-03-06T04:04:37.317190+010020216411A Network Trojan was detected192.168.2.659071104.21.16.180TCP
              2025-03-06T04:04:39.236859+010020216411A Network Trojan was detected192.168.2.659077104.21.16.180TCP
              2025-03-06T04:04:41.158663+010020216411A Network Trojan was detected192.168.2.659081104.21.16.180TCP
              2025-03-06T04:04:43.126252+010020216411A Network Trojan was detected192.168.2.659086104.21.16.180TCP
              2025-03-06T04:04:45.054916+010020216411A Network Trojan was detected192.168.2.659091104.21.16.180TCP
              2025-03-06T04:04:47.227160+010020216411A Network Trojan was detected192.168.2.659096104.21.16.180TCP
              2025-03-06T04:04:49.029554+010020216411A Network Trojan was detected192.168.2.659102104.21.16.180TCP
              2025-03-06T04:04:51.034762+010020216411A Network Trojan was detected192.168.2.659107104.21.16.180TCP
              2025-03-06T04:04:52.984767+010020216411A Network Trojan was detected192.168.2.659111104.21.16.180TCP
              2025-03-06T04:04:54.931565+010020216411A Network Trojan was detected192.168.2.659116104.21.16.180TCP
              2025-03-06T04:04:56.957167+010020216411A Network Trojan was detected192.168.2.659121104.21.16.180TCP
              2025-03-06T04:04:58.912947+010020216411A Network Trojan was detected192.168.2.659127104.21.16.180TCP
              2025-03-06T04:05:00.845623+010020216411A Network Trojan was detected192.168.2.659131104.21.16.180TCP
              2025-03-06T04:05:02.800675+010020216411A Network Trojan was detected192.168.2.659136104.21.16.180TCP
              2025-03-06T04:05:04.838430+010020216411A Network Trojan was detected192.168.2.659142104.21.16.180TCP
              2025-03-06T04:05:06.783994+010020216411A Network Trojan was detected192.168.2.659147104.21.16.180TCP
              2025-03-06T04:05:08.672822+010020216411A Network Trojan was detected192.168.2.659152104.21.16.180TCP
              2025-03-06T04:05:10.548245+010020216411A Network Trojan was detected192.168.2.659156104.21.16.180TCP
              2025-03-06T04:05:12.425406+010020216411A Network Trojan was detected192.168.2.659161104.21.16.180TCP
              2025-03-06T04:05:14.378001+010020216411A Network Trojan was detected192.168.2.659167104.21.16.180TCP
              2025-03-06T04:05:16.332459+010020216411A Network Trojan was detected192.168.2.659171104.21.16.180TCP
              2025-03-06T04:05:18.189655+010020216411A Network Trojan was detected192.168.2.659176104.21.16.180TCP
              2025-03-06T04:05:20.069802+010020216411A Network Trojan was detected192.168.2.659181104.21.16.180TCP
              2025-03-06T04:05:22.004551+010020216411A Network Trojan was detected192.168.2.659186104.21.16.180TCP
              2025-03-06T04:05:23.925500+010020216411A Network Trojan was detected192.168.2.659191104.21.16.180TCP
              2025-03-06T04:05:25.862053+010020216411A Network Trojan was detected192.168.2.659196104.21.16.180TCP
              2025-03-06T04:05:27.738975+010020216411A Network Trojan was detected192.168.2.659202104.21.16.180TCP
              2025-03-06T04:05:29.713587+010020216411A Network Trojan was detected192.168.2.659206104.21.16.180TCP
              2025-03-06T04:05:31.626941+010020216411A Network Trojan was detected192.168.2.659212104.21.16.180TCP
              2025-03-06T04:05:33.509861+010020216411A Network Trojan was detected192.168.2.659216104.21.16.180TCP
              2025-03-06T04:05:35.331358+010020216411A Network Trojan was detected192.168.2.659221104.21.16.180TCP
              2025-03-06T04:05:37.592679+010020216411A Network Trojan was detected192.168.2.659227104.21.16.180TCP
              2025-03-06T04:05:39.502540+010020216411A Network Trojan was detected192.168.2.659231104.21.16.180TCP
              2025-03-06T04:05:41.440392+010020216411A Network Trojan was detected192.168.2.659237104.21.16.180TCP
              2025-03-06T04:05:43.331199+010020216411A Network Trojan was detected192.168.2.659240104.21.16.180TCP
              2025-03-06T04:05:45.266738+010020216411A Network Trojan was detected192.168.2.659246104.21.16.180TCP
              2025-03-06T04:05:47.164818+010020216411A Network Trojan was detected192.168.2.659251104.21.16.180TCP
              2025-03-06T04:05:48.954382+010020216411A Network Trojan was detected192.168.2.659256104.21.16.180TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-03-06T04:03:45.735358+010028257661Malware Command and Control Activity Detected192.168.2.649709104.21.16.180TCP
              2025-03-06T04:03:47.665765+010028257661Malware Command and Control Activity Detected192.168.2.649710104.21.16.180TCP
              2025-03-06T04:03:48.542508+010028257661Malware Command and Control Activity Detected192.168.2.649711104.21.16.180TCP
              2025-03-06T04:03:50.566688+010028257661Malware Command and Control Activity Detected192.168.2.649713104.21.16.180TCP
              2025-03-06T04:03:52.446459+010028257661Malware Command and Control Activity Detected192.168.2.649714104.21.16.180TCP
              2025-03-06T04:03:54.361622+010028257661Malware Command and Control Activity Detected192.168.2.649720104.21.16.180TCP
              2025-03-06T04:03:56.390014+010028257661Malware Command and Control Activity Detected192.168.2.649726104.21.16.180TCP
              2025-03-06T04:03:58.316473+010028257661Malware Command and Control Activity Detected192.168.2.649732104.21.16.180TCP
              2025-03-06T04:04:00.195263+010028257661Malware Command and Control Activity Detected192.168.2.649737104.21.16.180TCP
              2025-03-06T04:04:02.151058+010028257661Malware Command and Control Activity Detected192.168.2.649742104.21.16.180TCP
              2025-03-06T04:04:04.265359+010028257661Malware Command and Control Activity Detected192.168.2.649749104.21.16.180TCP
              2025-03-06T04:04:06.201744+010028257661Malware Command and Control Activity Detected192.168.2.649755104.21.16.180TCP
              2025-03-06T04:04:08.125482+010028257661Malware Command and Control Activity Detected192.168.2.649761104.21.16.180TCP
              2025-03-06T04:04:10.062674+010028257661Malware Command and Control Activity Detected192.168.2.649766104.21.16.180TCP
              2025-03-06T04:04:11.988824+010028257661Malware Command and Control Activity Detected192.168.2.649768104.21.16.180TCP
              2025-03-06T04:04:13.900262+010028257661Malware Command and Control Activity Detected192.168.2.649774104.21.16.180TCP
              2025-03-06T04:04:15.812629+010028257661Malware Command and Control Activity Detected192.168.2.649780104.21.16.180TCP
              2025-03-06T04:04:17.719575+010028257661Malware Command and Control Activity Detected192.168.2.649786104.21.16.180TCP
              2025-03-06T04:04:19.687413+010028257661Malware Command and Control Activity Detected192.168.2.649790104.21.16.180TCP
              2025-03-06T04:04:21.613325+010028257661Malware Command and Control Activity Detected192.168.2.649793104.21.16.180TCP
              2025-03-06T04:04:23.536257+010028257661Malware Command and Control Activity Detected192.168.2.649799104.21.16.180TCP
              2025-03-06T04:04:25.425745+010028257661Malware Command and Control Activity Detected192.168.2.649805104.21.16.180TCP
              2025-03-06T04:04:27.347257+010028257661Malware Command and Control Activity Detected192.168.2.649810104.21.16.180TCP
              2025-03-06T04:04:29.224142+010028257661Malware Command and Control Activity Detected192.168.2.659051104.21.16.180TCP
              2025-03-06T04:04:31.359423+010028257661Malware Command and Control Activity Detected192.168.2.659055104.21.16.180TCP
              2025-03-06T04:04:33.266425+010028257661Malware Command and Control Activity Detected192.168.2.659060104.21.16.180TCP
              2025-03-06T04:04:35.188451+010028257661Malware Command and Control Activity Detected192.168.2.659066104.21.16.180TCP
              2025-03-06T04:04:37.317190+010028257661Malware Command and Control Activity Detected192.168.2.659071104.21.16.180TCP
              2025-03-06T04:04:39.236859+010028257661Malware Command and Control Activity Detected192.168.2.659077104.21.16.180TCP
              2025-03-06T04:04:41.158663+010028257661Malware Command and Control Activity Detected192.168.2.659081104.21.16.180TCP
              2025-03-06T04:04:43.126252+010028257661Malware Command and Control Activity Detected192.168.2.659086104.21.16.180TCP
              2025-03-06T04:04:45.054916+010028257661Malware Command and Control Activity Detected192.168.2.659091104.21.16.180TCP
              2025-03-06T04:04:47.227160+010028257661Malware Command and Control Activity Detected192.168.2.659096104.21.16.180TCP
              2025-03-06T04:04:49.029554+010028257661Malware Command and Control Activity Detected192.168.2.659102104.21.16.180TCP
              2025-03-06T04:04:51.034762+010028257661Malware Command and Control Activity Detected192.168.2.659107104.21.16.180TCP
              2025-03-06T04:04:52.984767+010028257661Malware Command and Control Activity Detected192.168.2.659111104.21.16.180TCP
              2025-03-06T04:04:54.931565+010028257661Malware Command and Control Activity Detected192.168.2.659116104.21.16.180TCP
              2025-03-06T04:04:56.957167+010028257661Malware Command and Control Activity Detected192.168.2.659121104.21.16.180TCP
              2025-03-06T04:04:58.912947+010028257661Malware Command and Control Activity Detected192.168.2.659127104.21.16.180TCP
              2025-03-06T04:05:00.845623+010028257661Malware Command and Control Activity Detected192.168.2.659131104.21.16.180TCP
              2025-03-06T04:05:02.800675+010028257661Malware Command and Control Activity Detected192.168.2.659136104.21.16.180TCP
              2025-03-06T04:05:04.838430+010028257661Malware Command and Control Activity Detected192.168.2.659142104.21.16.180TCP
              2025-03-06T04:05:06.783994+010028257661Malware Command and Control Activity Detected192.168.2.659147104.21.16.180TCP
              2025-03-06T04:05:08.672822+010028257661Malware Command and Control Activity Detected192.168.2.659152104.21.16.180TCP
              2025-03-06T04:05:10.548245+010028257661Malware Command and Control Activity Detected192.168.2.659156104.21.16.180TCP
              2025-03-06T04:05:12.425406+010028257661Malware Command and Control Activity Detected192.168.2.659161104.21.16.180TCP
              2025-03-06T04:05:14.378001+010028257661Malware Command and Control Activity Detected192.168.2.659167104.21.16.180TCP
              2025-03-06T04:05:16.332459+010028257661Malware Command and Control Activity Detected192.168.2.659171104.21.16.180TCP
              2025-03-06T04:05:18.189655+010028257661Malware Command and Control Activity Detected192.168.2.659176104.21.16.180TCP
              2025-03-06T04:05:20.069802+010028257661Malware Command and Control Activity Detected192.168.2.659181104.21.16.180TCP
              2025-03-06T04:05:22.004551+010028257661Malware Command and Control Activity Detected192.168.2.659186104.21.16.180TCP
              2025-03-06T04:05:23.925500+010028257661Malware Command and Control Activity Detected192.168.2.659191104.21.16.180TCP
              2025-03-06T04:05:25.862053+010028257661Malware Command and Control Activity Detected192.168.2.659196104.21.16.180TCP
              2025-03-06T04:05:27.738975+010028257661Malware Command and Control Activity Detected192.168.2.659202104.21.16.180TCP
              2025-03-06T04:05:29.713587+010028257661Malware Command and Control Activity Detected192.168.2.659206104.21.16.180TCP
              2025-03-06T04:05:31.626941+010028257661Malware Command and Control Activity Detected192.168.2.659212104.21.16.180TCP
              2025-03-06T04:05:33.509861+010028257661Malware Command and Control Activity Detected192.168.2.659216104.21.16.180TCP
              2025-03-06T04:05:35.331358+010028257661Malware Command and Control Activity Detected192.168.2.659221104.21.16.180TCP
              2025-03-06T04:05:37.592679+010028257661Malware Command and Control Activity Detected192.168.2.659227104.21.16.180TCP
              2025-03-06T04:05:39.502540+010028257661Malware Command and Control Activity Detected192.168.2.659231104.21.16.180TCP
              2025-03-06T04:05:41.440392+010028257661Malware Command and Control Activity Detected192.168.2.659237104.21.16.180TCP
              2025-03-06T04:05:43.331199+010028257661Malware Command and Control Activity Detected192.168.2.659240104.21.16.180TCP
              2025-03-06T04:05:45.266738+010028257661Malware Command and Control Activity Detected192.168.2.659246104.21.16.180TCP
              2025-03-06T04:05:47.164818+010028257661Malware Command and Control Activity Detected192.168.2.659251104.21.16.180TCP
              2025-03-06T04:05:48.954382+010028257661Malware Command and Control Activity Detected192.168.2.659256104.21.16.180TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: http://alphastand.win/alien/fre.phpAvira URL Cloud: Label: malware
              Source: http://kbfvzoboss.bid/alien/fre.phpAvira URL Cloud: Label: phishing
              Source: http://alphastand.trade/alien/fre.phpAvira URL Cloud: Label: malware
              Source: http://alphastand.top/alien/fre.phpAvira URL Cloud: Label: malware
              Source: 2.2.svchost.exe.400000.0.unpackMalware Configuration Extractor: Lokibot {"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php"]}
              Source: Payment Record.exeReversingLabs: Detection: 36%
              Source: Payment Record.exeVirustotal: Detection: 29%Perma Link
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: Payment Record.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
              Source: Binary string: wntdll.pdbUGP source: Payment Record.exe, 00000000.00000003.2127326000.0000000003980000.00000004.00001000.00020000.00000000.sdmp, Payment Record.exe, 00000000.00000003.2126483693.0000000003B20000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdb source: Payment Record.exe, 00000000.00000003.2127326000.0000000003980000.00000004.00001000.00020000.00000000.sdmp, Payment Record.exe, 00000000.00000003.2126483693.0000000003B20000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: svchost.pdb source: svchost.exe, svchost.exe, 00000002.00000002.3366251258.0000000000A71000.00000020.00000001.01000000.00000005.sdmp
              Source: Binary string: svchost.pdbUGP source: svchost.exe, 00000002.00000002.3366251258.0000000000A71000.00000020.00000001.01000000.00000005.sdmp
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_0070445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_0070445A
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_0070C6D1 FindFirstFileW,FindClose,0_2_0070C6D1
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_0070C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0070C75C
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_0070EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0070EF95
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_0070F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0070F0F2
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_0070F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0070F3F3
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_007037EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_007037EF
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_00703B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00703B12
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_0070BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0070BCBC
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00403D74 FindFirstFileW,FindNextFileW,FindFirstFileW,FindNextFileW,2_2_00403D74

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49711 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49711 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49711 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49720 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49742 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49720 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49720 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49742 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49742 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49726 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49726 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49709 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49714 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49726 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:49742 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49714 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49714 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:49720 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:49726 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49709 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49709 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49710 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49749 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:49711 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49710 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49710 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49737 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49737 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49737 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2024312 - Severity 1 - ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1 : 192.168.2.6:49709 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49790 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49790 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49793 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49774 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2024312 - Severity 1 - ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M1 : 192.168.2.6:49710 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49793 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49790 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49793 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49768 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49774 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49774 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49768 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49768 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:49737 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:49790 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49755 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.16.1:80 -> 192.168.2.6:49742
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:49714 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:49774 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:49768 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49780 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49780 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49780 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:49780 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:59060 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:59060 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:59060 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.16.1:80 -> 192.168.2.6:49714
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:59060 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:59077 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:59077 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:59077 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:49793 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49732 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.16.1:80 -> 192.168.2.6:49726
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49755 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49732 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49755 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49732 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:59051 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:59051 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49749 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49749 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:49732 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:49749 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.16.1:80 -> 192.168.2.6:59060
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:49755 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:59086 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:59086 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:59086 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49761 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49761 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49761 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.16.1:80 -> 192.168.2.6:49720
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:59086 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:49761 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:59077 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:59051 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:59051 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.16.1:80 -> 192.168.2.6:49737
              Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.16.1:80 -> 192.168.2.6:49768
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:59107 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:59091 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:59091 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:59091 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.16.1:80 -> 192.168.2.6:49761
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:59121 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:59121 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:59121 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49810 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.16.1:80 -> 192.168.2.6:49749
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49810 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49810 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:59107 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:59107 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:59091 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:59107 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49786 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:59055 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49786 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49786 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:59055 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:59055 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:49810 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:59081 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:59081 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:59081 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:59081 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.16.1:80 -> 192.168.2.6:59051
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49799 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49799 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49799 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:59055 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:59152 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:59152 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:59152 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:59136 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:49799 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:59147 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:59136 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:59147 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:59147 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:59136 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:49786 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:59152 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:59147 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.16.1:80 -> 192.168.2.6:59107
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:59136 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:59131 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49766 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:59131 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49766 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:59071 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49766 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:59071 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:59071 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:59161 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:49766 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:59161 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:59071 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:59121 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:59161 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:59161 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:59131 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.16.1:80 -> 192.168.2.6:59077
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:59181 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49713 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:59181 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:59181 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49713 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:59186 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49713 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:59186 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:59186 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:59131 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:59181 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:49713 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:59186 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:59142 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:59142 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:59142 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.16.1:80 -> 192.168.2.6:59161
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:59142 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.16.1:80 -> 192.168.2.6:49793
              Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.16.1:80 -> 192.168.2.6:49766
              Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.16.1:80 -> 192.168.2.6:59086
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:49805 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:49805 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.16.1:80 -> 192.168.2.6:59071
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:59227 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.16.1:80 -> 192.168.2.6:59181
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:59227 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:59227 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.16.1:80 -> 192.168.2.6:59081
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:49805 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:59227 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:59102 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:59102 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:59102 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:49805 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:59102 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.16.1:80 -> 192.168.2.6:59186
              Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.16.1:80 -> 192.168.2.6:59136
              Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.16.1:80 -> 192.168.2.6:59091
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:59256 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:59256 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:59256 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:59237 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.16.1:80 -> 192.168.2.6:59055
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:59221 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:59221 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:59221 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:59237 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:59237 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:59231 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.16.1:80 -> 192.168.2.6:49805
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:59221 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:59231 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:59256 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:59237 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:59231 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.16.1:80 -> 192.168.2.6:59121
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:59191 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:59191 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:59191 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:59156 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:59096 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:59096 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:59096 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.16.1:80 -> 192.168.2.6:49790
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:59191 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.16.1:80 -> 192.168.2.6:59102
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:59096 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:59231 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:59167 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:59167 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:59167 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:59167 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:59176 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:59176 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:59176 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:59111 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:59111 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:59066 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:59111 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:59066 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:59066 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:59240 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:59240 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:59066 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:59111 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:59240 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:59212 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:59240 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:59156 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:59156 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:59176 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.16.1:80 -> 192.168.2.6:59131
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:59156 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.16.1:80 -> 192.168.2.6:59111
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:59251 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.16.1:80 -> 192.168.2.6:59240
              Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.16.1:80 -> 192.168.2.6:59167
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:59246 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:59251 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:59251 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.16.1:80 -> 192.168.2.6:59066
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:59246 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:59251 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:59246 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:59246 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.16.1:80 -> 192.168.2.6:59142
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:59116 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:59116 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:59116 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:59202 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:59202 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:59116 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:59212 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:59212 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:59212 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:59127 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:59127 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:59127 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.16.1:80 -> 192.168.2.6:59251
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:59127 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:59202 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:59171 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:59171 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:59202 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.16.1:80 -> 192.168.2.6:59231
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:59171 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:59171 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.16.1:80 -> 192.168.2.6:59127
              Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.16.1:80 -> 192.168.2.6:59202
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:59206 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:59206 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:59206 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:59206 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.16.1:80 -> 192.168.2.6:59171
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:59216 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:59216 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:59216 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:59216 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025483 - Severity 1 - ET MALWARE LokiBot Fake 404 Response : 104.21.16.1:80 -> 192.168.2.6:59216
              Source: Network trafficSuricata IDS: 2021641 - Severity 1 - ET MALWARE LokiBot User-Agent (Charon/Inferno) : 192.168.2.6:59196 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2025381 - Severity 1 - ET MALWARE LokiBot Checkin : 192.168.2.6:59196 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2825766 - Severity 1 - ETPRO MALWARE LokiBot Checkin M2 : 192.168.2.6:59196 -> 104.21.16.1:80
              Source: Network trafficSuricata IDS: 2024313 - Severity 1 - ET MALWARE LokiBot Request for C2 Commands Detected M1 : 192.168.2.6:59196 -> 104.21.16.1:80
              Source: C:\Windows\SysWOW64\svchost.exeNetwork Connect: 104.21.16.1 80Jump to behavior
              Source: Malware configuration extractorURLs: http://kbfvzoboss.bid/alien/fre.php
              Source: Malware configuration extractorURLs: http://alphastand.trade/alien/fre.php
              Source: Malware configuration extractorURLs: http://alphastand.win/alien/fre.php
              Source: Malware configuration extractorURLs: http://alphastand.top/alien/fre.php
              Source: global trafficTCP traffic: 192.168.2.6:59045 -> 162.159.36.2:53
              Source: Joe Sandbox ViewIP Address: 104.21.16.1 104.21.16.1
              Source: Joe Sandbox ViewIP Address: 104.21.16.1 104.21.16.1
              Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 188Connection: close
              Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 188Connection: close
              Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 161Connection: close
              Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 161Connection: close
              Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 161Connection: close
              Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 161Connection: close
              Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 161Connection: close
              Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 161Connection: close
              Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 161Connection: close
              Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 161Connection: close
              Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 161Connection: close
              Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 161Connection: close
              Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 161Connection: close
              Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 161Connection: close
              Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 161Connection: close
              Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 161Connection: close
              Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 161Connection: close
              Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 161Connection: close
              Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 161Connection: close
              Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 161Connection: close
              Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 161Connection: close
              Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 161Connection: close
              Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 161Connection: close
              Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 161Connection: close
              Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 161Connection: close
              Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 161Connection: close
              Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 161Connection: close
              Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 161Connection: close
              Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 161Connection: close
              Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 161Connection: close
              Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 161Connection: close
              Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 161Connection: close
              Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 161Connection: close
              Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 161Connection: close
              Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 161Connection: close
              Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 161Connection: close
              Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 161Connection: close
              Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 161Connection: close
              Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 161Connection: close
              Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 161Connection: close
              Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 161Connection: close
              Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 161Connection: close
              Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 161Connection: close
              Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 161Connection: close
              Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 161Connection: close
              Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 161Connection: close
              Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 161Connection: close
              Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 161Connection: close
              Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 161Connection: close
              Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 161Connection: close
              Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 161Connection: close
              Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 161Connection: close
              Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 161Connection: close
              Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 161Connection: close
              Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 161Connection: close
              Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 161Connection: close
              Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 161Connection: close
              Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 161Connection: close
              Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 161Connection: close
              Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 161Connection: close
              Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 161Connection: close
              Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 161Connection: close
              Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 161Connection: close
              Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 161Connection: close
              Source: global trafficHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 161Connection: close
              Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
              Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
              Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
              Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_007122EE InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_007122EE
              Source: global trafficDNS traffic detected: DNS query: touxzw.ir
              Source: unknownHTTP traffic detected: POST /sccc/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: touxzw.irAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: D509030Content-Length: 188Connection: close
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 06 Mar 2025 03:03:46 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=RFAUUD0mBtUAeLvBCfLg4ztyEDP3FbRB4JqvBSAbweULvuVeZHiatAMVO20RkA7qyn7iIrK2z7pxoa7IVz9sSsKc6H2npgyngxpU%2FKPnp92YQgmoic8R1OW%2BN%2FI%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91be9f3168b77293-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1986&min_rtt=1986&rtt_var=993&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=426&delivery_rate=0&cwnd=175&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 06 Mar 2025 03:03:48 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=TlHkPmAfYPk1qxdYGiczn%2Bh7jpV%2BIAXT7eMXiZAmfyjyLJhN0yrKdxpfoGJi7LEt6oni%2FAVS74reZ3Va6Tapu2l0YcYi7RAPkaPvZWO1tYx1pPXBW%2BIbQCasmWk%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91be9f3d98f841ba-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1653&min_rtt=1653&rtt_var=826&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=426&delivery_rate=0&cwnd=218&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 06 Mar 2025 03:03:53 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=sDJoAwCo0P75TT45VShhig9Y9tLeld1%2BNXM2yNWowuIzqPStTd74OxAYzi0kxyV%2FLcrM2eXGIVylzKGWu%2F8B9z7pWJQhFw34n9P6dYFgVNe7XURMdO9QnA0O0Gg%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91be9f5b5fba3f3b-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1621&min_rtt=1621&rtt_var=810&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=399&delivery_rate=0&cwnd=56&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 06 Mar 2025 03:03:55 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=BrAxnEqCRZhY4IJFw1A47Px68rGLUw76IcQtTpH%2BMLVzHRelc%2F%2B5FxMPkf5JRuUdZsyU%2BOdpb46KKSqUYlEPc3XNRK9ydyCu%2BCjqZLBLyWC%2FZzmGG3a9XDLzLTA%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91be9f675aa33f3b-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1712&min_rtt=1712&rtt_var=856&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=399&delivery_rate=0&cwnd=56&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 06 Mar 2025 03:03:57 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=2wWlJ00SakndZ%2FTjfot%2FeD2iiar%2BBCoN0i3TaRhbTfKGPB7WEqTRkTpAnxo5h8nk%2BouTn87PPzir2lHx4jk25AAChdP6IBCNaIvtTepgUKciyR9Z4M23aI74qx0%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91be9f73f9620fa8-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1459&min_rtt=1459&rtt_var=729&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=399&delivery_rate=0&cwnd=192&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 06 Mar 2025 03:04:00 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=K0%2BGw10f%2BnKIA07XZnN7MtItaaVWCQzbVLYX4taKWY40s6LT5RX7ASD16vsP8AMai%2FxWvb2Hg9PnORYAzCwcGVZoitDd8J5SNcylQiPLTrfL3dWPIw3AXF9weKQ%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91be9f8bc8ed70a4-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=2040&min_rtt=2040&rtt_var=1020&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=399&delivery_rate=0&cwnd=158&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 06 Mar 2025 03:04:02 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=0ZWd926cxHz3DSAuOuXWjck08%2Btax3HUA3h2bb4%2BpSFFDtC9P8%2F%2FUxoD3pnMXCEHSIFwlkqpW%2FiQHZXOwzSUSiW30KPIhU2IUzfN6SKZW%2F4fMqqdU%2FLGSfZ7Kr0%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91be9f9809f31899-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1601&min_rtt=1601&rtt_var=800&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=399&delivery_rate=0&cwnd=186&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 06 Mar 2025 03:04:04 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=RE2VBXoez16nIt3oq%2BVSj51IT5PQbClMyL0U2HjAFT%2Bn8q4r91nDXyiQjX5PKIlfujfIVZbVVRv5gwYdppsctExvivnQ5txh5rctSogzY3beKiyH21rA6LBGbDI%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91be9fa53f6341ba-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=2055&min_rtt=2055&rtt_var=1027&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=399&delivery_rate=0&cwnd=218&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 06 Mar 2025 03:04:08 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=2fntWByWpkbrE91fWTCBsEaIuvD8NXpRjlDOfJ7OZWNRkoLO0aIcnIFvlaEe1Yk%2F054rIcXvqJb6hIOhV6wppqfBLPvlHoW9IQbFhI2Q7eKijmr6T78sZV3AkE8%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91be9fbd6a6f3f3b-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1667&min_rtt=1667&rtt_var=833&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=399&delivery_rate=0&cwnd=56&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 06 Mar 2025 03:04:10 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=oOGHvDAJDihC0aZs1LzlsRLf3cJ7Wf%2BBaa19C3GgxM2y2DPlwihEVbhKi3MbatGUDNK1FJqrTAonU7Ib34i1KCMXb16mXqlMIowpDkNk15YLFlz3PvVaTxP0gIc%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91be9fc97da13f3b-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1645&min_rtt=1645&rtt_var=822&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=399&delivery_rate=0&cwnd=56&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 06 Mar 2025 03:04:12 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=0lVXVGhCL87tfphFGOZ2uRcRygETksMhP%2F4TTgcjbmLDkUNpJ%2B9AoG0l1okJy2ZQ5b%2FRYRI8lEllLVIsctQDTHwxzIkqRaSFhOgoiDOT08dYMZz%2FuNn%2FRfJ%2FVmI%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91be9fd57b793f3b-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1629&min_rtt=1629&rtt_var=814&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=399&delivery_rate=0&cwnd=56&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 06 Mar 2025 03:04:20 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=jVYZJiqjshvq%2BQfXIvtICq2ElIdq4tCpNrBveAi94Mf8hYwOWh01ztlC8%2FRfScsHtTfdK3N1yt0Hc5UTYW4BYyscpieVFYsPcFJOM3SHihG9%2BNp78oFgAm2vdro%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91bea00598c74388-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1567&min_rtt=1567&rtt_var=783&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=399&delivery_rate=0&cwnd=233&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 06 Mar 2025 03:04:22 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=U88sVs6H2v0nVxKEhqlb6GIq3LuoLANU4uz0da7OITn2vvczhFfxJbH%2F4%2FSa5NnzOh6L2fXSvneo05HwGx18OTqW7cQBZjpbJ0z7IQJvg3AMs0HmRBwI13dWWsk%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91bea011ad200fa8-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1483&min_rtt=1483&rtt_var=741&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=399&delivery_rate=0&cwnd=192&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 06 Mar 2025 03:04:26 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=OG%2BthYgLOi2yLtHh1ju7BtIMprOSdy20iUQfdOBHsbq%2FbQZ%2FCfjmw%2BYh%2BWnQJue16PLIVizC4hnN6etHY3v%2BYUdNzMbw9jIz52qV%2B4OykMf6QppeQcvk7hwVjws%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91bea02978f31899-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1740&min_rtt=1740&rtt_var=870&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=399&delivery_rate=0&cwnd=186&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 06 Mar 2025 03:04:29 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=F4%2BN180YjQhLVIXrr2WK2myX8fOC6iDSAJxDaQmbjA02W2MEG26Nys%2FTfPfgiojc2w%2F%2BuuSDcT72p3kDZj9AfxV0WePjfHPiuT8dYm3GJi6Nk9IHFh8QhiYOJMU%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91bea0413e4b7293-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1931&min_rtt=1931&rtt_var=965&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=399&delivery_rate=0&cwnd=175&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 06 Mar 2025 03:04:32 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=QFZnMF0f1x3pevBuK%2Bf6f1am2YkpqzC1CT2lGVquQ0WMBz%2FNCOa00zJGBILJYHIHqy7w%2B6%2BMdVkipEb86NlkMOQJ6VAekEBvTAyoybxw4BWrcaS2OFJFN35WEo4%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91bea04e8e4f8ce0-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1802&min_rtt=1802&rtt_var=901&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=399&delivery_rate=0&cwnd=228&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 06 Mar 2025 03:04:33 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=a4ZgfosyVwRscRfknW%2BztejOntzKq%2Fh1bW3RC6SISfv97UX6N7kfJjIiAsPZyV6102YXKNB9Yie3HXIOHy0E15P6xwtAxJWbA2qjxdhNlmAVAfM8bAAbKp1OZWo%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91bea05a7d1d8ce0-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1779&min_rtt=1779&rtt_var=889&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=399&delivery_rate=0&cwnd=228&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 06 Mar 2025 03:04:35 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=6M9m7K6Gr1rYafzRd82XcweG8%2B4h9lRUZ7MfMGL0BNktQW0jMDuZHtam6YGntCfTzn%2FT9pqFJq4avaOQKMXrNNNuw1n1i5ECQk2g4Exhb9N%2FDt5pJVfRG1U3HB8%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91bea0669bb141ba-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1668&min_rtt=1668&rtt_var=834&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=399&delivery_rate=0&cwnd=218&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 06 Mar 2025 03:04:38 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Gip8Fk%2Bmq6z2iLCYXejYbJcoc7f1BiMyX4uZwo1329AsjBYN1l6hMh3KMvmJhVFYf%2FfaNGNv0ktn4sZDCIYQ2uG0pXjnW7FwlvTMqgjLDTlQ0n5JK0B85y0quYA%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91bea073cd6470a4-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=2133&min_rtt=2133&rtt_var=1066&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=399&delivery_rate=0&cwnd=158&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 06 Mar 2025 03:04:39 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=EfgNK4VFQSk756Q%2FER85j5ETluMp%2FAEA%2BemGBXI%2FsdFe2aZ3qkvkhYRqP4%2BIoToeElXAnwI4ieStSH6iqLGinisBxQnkoDg0FjvdRWvj84GTq7EQBTJ%2F3KeQKRE%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91bea07fdd1a3f3b-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1602&min_rtt=1602&rtt_var=801&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=399&delivery_rate=0&cwnd=56&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 06 Mar 2025 03:04:41 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ZCKELN3KMi%2BsQ9fusTBRjFKlsWOOEP5locBoJIFq4suvRbi8fpfeWEr9sqAjj5GUw5wMdeR6t7UFF46p9DtsRglQt0WOMdHGPFvN52RKuVbOQhI5e2K%2BSJYF9pI%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91bea08befca0fa8-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1448&min_rtt=1448&rtt_var=724&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=399&delivery_rate=0&cwnd=192&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 06 Mar 2025 03:04:43 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=hblQQHuSAjctcXG1%2BJIcZeDx8HduLQ0dL4Q8NmLftHq8Me6CaRdl%2BCaSI7PRcK8QdHtn%2FSwGuEOADhHrqpB%2Fq0mtEfrBWmyUkV7Ec1DHlhaZkgH7joN7EUDUP5A%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91bea0981a8e0fa8-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1467&min_rtt=1467&rtt_var=733&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=399&delivery_rate=0&cwnd=192&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 06 Mar 2025 03:04:45 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=EeMNFNMqnhHthAFCfhedhi1%2FLlrsKpwj4SbKW0s5SBVZoRjZ5x7YOOyIANStOz74Dqor4oxPnSipo4eT4neHyeUOSC1Ej5esm1q8MnFSyHWSnbzai%2B9R6XlEqAY%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91bea0a428a98ce0-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1765&min_rtt=1765&rtt_var=882&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=399&delivery_rate=0&cwnd=228&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 06 Mar 2025 03:04:49 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=L3vsOnT6%2FZJB69%2F0kQ1uxl0qyveC%2BmqzlBi6Y3M56UcjN%2F2U%2By%2BoRWsccN%2FyHe9bZjqUZbVSFrj%2FOyeMZr%2BeCYmbh8DSIllL6E7rkFOjxVtJCmuurLSrr%2BSH%2BMY%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91bea0bcfbcc3f3b-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1642&min_rtt=1642&rtt_var=821&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=399&delivery_rate=0&cwnd=56&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 06 Mar 2025 03:04:51 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ENh3R9kBcHLBxUeeywGx39VoS0XQGxT%2Bh12%2F7kWIlBy5GQ1tZHq5y2pKb4oKB%2F0SGHW6NrV2WutwcHKQ6gdKd80Qe08NxrVF870XcCYdB9rAw0qmOmoSXy6rGDU%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91bea0c99e394388-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1616&min_rtt=1616&rtt_var=808&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=399&delivery_rate=0&cwnd=233&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 06 Mar 2025 03:04:53 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=2fGvFVzw27ndwkRqh8sX8Z0fZAeR8aVOnY77qo3TEXrjTPQX%2B6hS8QlzjUbaC24rMgrgTcTImXec0OMMXbQ%2F6OlxjI9k2kZfQh16fb5hGSFLR4cFAahX6HSVbvw%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91bea0d5bde11899-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1546&min_rtt=1546&rtt_var=773&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=399&delivery_rate=0&cwnd=186&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 06 Mar 2025 03:04:57 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=1j6nzXSNfMmVkDogrEtNigBdph79CAFR%2FbolpzPhCy0gaBqyEFZUAMpm2g4sp5hCg3hW3W9sO02rV2ydIpNL65N29zm5R3jp1IG%2BmO8yBWkavzrYFw0dQKfWdXM%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91bea0ee8f118ce0-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1792&min_rtt=1792&rtt_var=896&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=399&delivery_rate=0&cwnd=228&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 06 Mar 2025 03:04:59 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=oNy%2F4fR3ICBllZLlJm1bvwQ7cKMljv5HMxv6Js37bAQpyrmajA%2BYjZ6UNXycvFmNxUWXDImfe03tgIVd7aO9HarOeb%2FmSRPiqGaF%2BrMu78aec%2BqmA%2BeHcaPQOpk%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91bea0fadd8370a4-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=2014&min_rtt=2014&rtt_var=1007&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=399&delivery_rate=0&cwnd=158&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 06 Mar 2025 03:05:01 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ZpkTnR%2Fhd7HdzVeothlWX3AY5fSdiQZvAGe9LjmY5gxOTZm56BxJyfnAplx1f4EPBNLqXoOPFIux7HxJi0uLtqhYmds9rUBCGGV6WFz5Nar8ARccAVUa%2FvZiZlc%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91bea106d93a41ba-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1629&min_rtt=1629&rtt_var=814&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=399&delivery_rate=0&cwnd=218&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 06 Mar 2025 03:05:03 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=zt0XSo7x3Y7Ox2aTroK64vLDLE%2FAkvCR3GLMg8Lyt84MlEn7NQQuIdk9mCPkk4RRMfCs4shkV0hIZK%2Fp6Mi%2FKDrkYb5pF5StqNhZ9Cv647VVnthRXZ8PyPwScgY%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91bea11308d64388-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1577&min_rtt=1577&rtt_var=788&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=399&delivery_rate=0&cwnd=233&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 06 Mar 2025 03:05:05 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Obj6IyEHEdT%2FI3oULcLYmuAUxKftqHz1UzZ41c17jtyQtI8BLNmue7yf6MhTINiNbvlvxYxkpXpn4zRBFJJPE5cm9KdbJCrqzXCu18kQlupG%2F5m6d7YQOUYR5lo%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91bea11fdf500fa8-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1454&min_rtt=1454&rtt_var=727&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=399&delivery_rate=0&cwnd=192&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 06 Mar 2025 03:05:13 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=v7r%2BTAjcrd8hSbsZ3nJG9imESFEfQLHkMhYxoNg2uBiHlfZT6I1ILyFe9W9HjedYRf516PgsRxZp7lYV54nVpYj9loM9t21VL4nYS2bZpGaHmwx6%2BklEXudN68U%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91bea14f4d897293-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1986&min_rtt=1986&rtt_var=993&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=399&delivery_rate=0&cwnd=175&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 06 Mar 2025 03:05:15 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=rc7bpncmhb0F54QtA4w0p8evLPitbheCySvGG0%2FtfZHw1%2By0JarIxSgm0uJzGrLj3zqtn5utIS5G5enIus1Er%2FitCBxGCx3X0JmHc1u629pzkuDMZjjBplxEsp4%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91bea15b6ebf4388-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1549&min_rtt=1549&rtt_var=774&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=399&delivery_rate=0&cwnd=233&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 06 Mar 2025 03:05:16 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=SIKrvCGm32EOlRwXxNIIl5xV%2BRjcykudXuqOOZgc4xR%2FjIFsNFzRB1v1aDt7uZS%2Fb7P%2BqWi5w2PHItnW%2Fc4lz3P%2FiLsc5bOg0sUIhmq5oitOkOsnoLvXnfDL%2Fj8%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91bea167c9fe70a4-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=2034&min_rtt=2034&rtt_var=1017&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=399&delivery_rate=0&cwnd=158&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 06 Mar 2025 03:05:20 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Fqdl8N5vbttEs96vty7h70rqxF84A%2Fq9WppmyJRKX0gG8ojoDK4c%2FpV2yzdO%2B9jr7LKPByw%2FlJH4tndY49CbVWKmIgl9EUUQCC3YGKL8NhGpCC1Gy5HStnPMMtg%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91bea17f1bbf8ce0-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1769&min_rtt=1769&rtt_var=884&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=399&delivery_rate=0&cwnd=228&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 06 Mar 2025 03:05:22 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=LMRg8a0nu%2FT5W0Pjdzr5p%2BjapjTigfKB5OoO2t5VZXY699tC3RUhLNlpXQqThawiaB0PyFrOuSzwTyfiKtonmo1hVvkZH2p5nERPNBERy3RKpkaA5ppU3Jk0g5Q%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91bea18b1f8670a4-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=2054&min_rtt=2054&rtt_var=1027&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=399&delivery_rate=0&cwnd=158&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 06 Mar 2025 03:05:28 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=CHPjPkeA67WBkU9AGzcP%2FOP0maBKqdawiW2M2xZrfSuP2f9hf5%2FuLqz3d7W8U%2FYxXml43fjuhnFEWl%2BxPunbND6TXlkzRW%2BliUwHVx8Y1n0UgD2e9kte9seuFgw%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91bea1aee8ca0fa8-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1475&min_rtt=1475&rtt_var=737&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=399&delivery_rate=0&cwnd=192&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 06 Mar 2025 03:05:34 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=jXODPcYY%2BKMFSo6s6mccEIlj6DK6S%2FFQ2awag6EGKawy%2FB251ZMDZ8JSQVx%2BvxVj2UFMLZW0yl0HAyoLEmxtlsLcBXHpF3NGshLdMWK4SOHE%2B5MJXuxmFYz%2B0q4%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91bea1d31e4270a4-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=2004&min_rtt=2004&rtt_var=1002&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=399&delivery_rate=0&cwnd=158&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 06 Mar 2025 03:05:40 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=HkYpFGGEFI33NA6cIqU9yMEUZM%2B%2FMvMUth1PpmXJBdQBinxyGXjZFCliETDTTXkNe2jESXNW5ovhMiyHeEepT5QBJJnc6M77ZnnGazybjcK34qPAAC%2FG89jW5mg%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91bea1f87c9f8ce0-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1775&min_rtt=1775&rtt_var=887&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=399&delivery_rate=0&cwnd=228&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 06 Mar 2025 03:05:44 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Z%2B51d%2FAcm6xiZ0BGrN3pgjvuqq%2FCKE2J8dO6bPcA9kEHV0tm2ELY3DJfBvnMY%2FkuFdZVl3rw6BR54cnQcYcUS3myozF%2BTVjKpXjH6RDyInpVlOs7SVKQa2e40SA%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91bea21069971899-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1717&min_rtt=1717&rtt_var=858&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=399&delivery_rate=0&cwnd=186&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 06 Mar 2025 03:05:47 GMTContent-Type: text/html; charset=UTF-8Connection: closeX-Powered-By: PHP/5.4.16Status: 404 Not Foundcf-cache-status: DYNAMICvary: accept-encodingReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ANX0trp1VOUng6lqD3zV8UuYQmPzC7R5rYzsopmJlYmit5YBD9kg2qiewjpuT9q9WHGUFBveDHviTQt5xsmEgzHghb%2B8zFI6FtQDOfcFsecuKQ6XcdetxalBrG4%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 91bea2285c020fa8-EWRalt-svc: h3=":443"; ma=86400server-timing: cfL4;desc="?proto=TCP&rtt=1484&min_rtt=1484&rtt_var=742&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=399&delivery_rate=0&cwnd=192&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: svchost.exe, svchost.exe, 00000002.00000002.3366156712.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ibsensoftware.com/
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_00714164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00714164
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_00714164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00714164
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_00713F66 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00713F66
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_0070001C GetKeyboardState,SetKeyboardState,GetAsyncKeyState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_0070001C
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_0072CABC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_0072CABC

              System Summary

              barindex
              Source: 0.2.Payment Record.exe.1080000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
              Source: 0.2.Payment Record.exe.1080000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
              Source: 0.2.Payment Record.exe.1080000.1.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 0.2.Payment Record.exe.1080000.1.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 0.2.Payment Record.exe.1080000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
              Source: 0.2.Payment Record.exe.1080000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
              Source: 0.2.Payment Record.exe.1080000.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 0.2.Payment Record.exe.1080000.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 0.2.Payment Record.exe.1080000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
              Source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
              Source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
              Source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
              Source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: 00000000.00000002.2129598847.0000000001080000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
              Source: 00000000.00000002.2129598847.0000000001080000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
              Source: 00000000.00000002.2129598847.0000000001080000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
              Source: 00000000.00000002.2129598847.0000000001080000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 00000000.00000002.2129598847.0000000001080000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: 00000002.00000002.3366156712.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
              Source: 00000002.00000002.3366156712.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 Author: unknown
              Source: 00000002.00000002.3366156712.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
              Source: 00000002.00000002.3366156712.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 00000002.00000002.3366156712.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: Process Memory Space: Payment Record.exe PID: 5952, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
              Source: Process Memory Space: svchost.exe PID: 320, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 Author: unknown
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: This is a third-party compiled AutoIt script.0_2_006A3B3A
              Source: Payment Record.exeString found in binary or memory: This is a third-party compiled AutoIt script.
              Source: Payment Record.exe, 00000000.00000000.2117000833.0000000000754000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_5f49dfab-e
              Source: Payment Record.exe, 00000000.00000000.2117000833.0000000000754000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_2cbebea5-6
              Source: Payment Record.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_df345b76-5
              Source: Payment Record.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_80effbae-5
              Source: initial sampleStatic PE information: Filename: Payment Record.exe
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A73540 RtlImageNtHeader,RpcMgmtSetServerStackSize,I_RpcServerDisableExceptionFilter,RtlSetProcessIsCritical,SetProcessMitigationPolicy,SetProcessMitigationPolicy,SetProcessMitigationPolicy,SetProtectedPolicy,HeapSetInformation,NtSetInformationProcess,2_2_00A73540
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A733C0 NtSetInformationProcess,SetUnhandledExceptionFilter,SetErrorMode,GetProcessHeap,InitializeSRWLock,InitializeSRWLock,RegDisablePredefinedCacheEx,EtwEventRegister,GetCommandLineW,memset,GetCurrentProcess,NtSetInformationProcess,HeapFree,HeapFree,ExitProcess,GetCurrentProcess,SetProcessAffinityUpdateMode,2_2_00A733C0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A72720 RegOpenKeyExW,RegOpenKeyExW,RegOpenKeyExW,RegCloseKey,RegCloseKey,HeapAlloc,RegQueryValueExW,ExpandEnvironmentStringsW,LCMapStringW,RegQueryValueExW,HeapFree,AcquireSRWLockShared,ReleaseSRWLockShared,HeapAlloc,memcpy,memcpy,AcquireSRWLockExclusive,ReleaseSRWLockExclusive,RegGetValueW,ActivateActCtx,LoadLibraryExW,MultiByteToWideChar,RtlRunOnceExecuteOnce,NtQuerySystemInformation,GetProcAddress,DeactivateActCtx,ActivateActCtx,MultiByteToWideChar,RtlRunOnceExecuteOnce,NtQuerySystemInformation,GetProcAddress,DeactivateActCtx,ActivateActCtx,MultiByteToWideChar,RtlRunOnceExecuteOnce,NtQuerySystemInformation,GetProcAddress,DeactivateActCtx,RegCloseKey,HeapAlloc,RegGetValueW,WideCharToMultiByte,HeapAlloc,WideCharToMultiByte,HeapFree,ExpandEnvironmentStringsW,HeapFree,CreateActCtxW,GetLastError,HeapFree,HeapFree,GetLastError,CreateActCtxW,GetLastError,ReleaseActCtx,GetLastError,GetLastError,RtlNtStatusToDosError,GetLastError,LoadLibraryExW,RtlNtStatusToDosError,LoadLibraryExW,RtlNtStatusToDosError,HeapFree,ReleaseActCtx,2_2_00A72720
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_0070A1EF: GetFullPathNameW,__swprintf,CreateDirectoryW,CreateFileW,_memset,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_0070A1EF
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_006F8310 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_006F8310
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_007051BD ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_007051BD
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_006CD9750_2_006CD975
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_006C21C50_2_006C21C5
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_006D62D20_2_006D62D2
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_007203DA0_2_007203DA
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_006D242E0_2_006D242E
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_006C25FA0_2_006C25FA
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_006FE6160_2_006FE616
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_006B66E10_2_006B66E1
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_006AE6A00_2_006AE6A0
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_006D878F0_2_006D878F
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_007208570_2_00720857
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_006D68440_2_006D6844
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_006B88080_2_006B8808
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_007088890_2_00708889
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_006CCB210_2_006CCB21
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_006D6DB60_2_006D6DB6
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_006B6F9E0_2_006B6F9E
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_006B30300_2_006B3030
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_006CF1D90_2_006CF1D9
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_006C31870_2_006C3187
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_006A12870_2_006A1287
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_006C14840_2_006C1484
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_006B55200_2_006B5520
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_006C76960_2_006C7696
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_006B57600_2_006B5760
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_006C19780_2_006C1978
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_006D9AB50_2_006D9AB5
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_006AFCE00_2_006AFCE0
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_00727DDB0_2_00727DDB
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_006CBDA60_2_006CBDA6
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_006C1D900_2_006C1D90
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_006ADF000_2_006ADF00
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_006B3FE00_2_006B3FE0
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_0108489C0_2_0108489C
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_010E18980_2_010E1898
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_01081DD40_2_01081DD4
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040549C2_2_0040549C
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_004029D42_2_004029D4
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A727202_2_00A72720
              Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 0041219C appears 45 times
              Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 00405B6F appears 42 times
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: String function: 006C8900 appears 42 times
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: String function: 006A7DE1 appears 36 times
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: String function: 006C0AE3 appears 70 times
              Source: Payment Record.exe, 00000000.00000003.2127817599.0000000003C4D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs Payment Record.exe
              Source: Payment Record.exe, 00000000.00000003.2127326000.0000000003AA3000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs Payment Record.exe
              Source: Payment Record.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
              Source: 0.2.Payment Record.exe.1080000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
              Source: 0.2.Payment Record.exe.1080000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
              Source: 0.2.Payment Record.exe.1080000.1.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 0.2.Payment Record.exe.1080000.1.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 0.2.Payment Record.exe.1080000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
              Source: 0.2.Payment Record.exe.1080000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
              Source: 0.2.Payment Record.exe.1080000.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 0.2.Payment Record.exe.1080000.1.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 0.2.Payment Record.exe.1080000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
              Source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
              Source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
              Source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
              Source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: 00000000.00000002.2129598847.0000000001080000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
              Source: 00000000.00000002.2129598847.0000000001080000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
              Source: 00000000.00000002.2129598847.0000000001080000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 00000000.00000002.2129598847.0000000001080000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 00000000.00000002.2129598847.0000000001080000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: 00000002.00000002.3366156712.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
              Source: 00000002.00000002.3366156712.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Lokibot_0f421617 reference_sample = de6200b184832e7d3bfe00c193034192774e3cfca96120dc97ad6fed1e472080, os = windows, severity = x86, creation_date = 2021-07-20, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = 9ff5d594428e4a5de84f0142dfa9f54cb75489192461deb978c70f1bdc88acda, id = 0f421617-df2b-4cb5-9d10-d984f6553012, last_modified = 2021-08-23
              Source: 00000002.00000002.3366156712.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 00000002.00000002.3366156712.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 00000002.00000002.3366156712.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: Process Memory Space: Payment Record.exe PID: 5952, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
              Source: Process Memory Space: svchost.exe PID: 320, type: MEMORYSTRMatched rule: Windows_Trojan_Lokibot_1f885282 reference_sample = 916eded682d11cbdf4bc872a8c1bcaae4d4e038ac0f869f59cc0a83867076409, os = windows, severity = x86, creation_date = 2021-06-22, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Lokibot, fingerprint = a7519bb0751a6c928af7548eaed2459e0ed26128350262d1278f74f2ad91331b, id = 1f885282-b60e-491e-ae1b-d26825e5aadb, last_modified = 2021-08-23
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/4@1/1
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_0070A06A GetLastError,FormatMessageW,0_2_0070A06A
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_006F81CB AdjustTokenPrivileges,CloseHandle,0_2_006F81CB
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_006F87E1 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_006F87E1
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040650A LookupPrivilegeValueW,AdjustTokenPrivileges,2_2_0040650A
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_0070B333 SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_0070B333
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_0071EE0D CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_0071EE0D
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_007183BB CoInitialize,CoUninitialize,CoCreateInstance,IIDFromString,VariantInit,VariantClear,0_2_007183BB
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_006A4E89 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_006A4E89
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A73360 I_RegisterSvchostNotificationCallback,StartServiceCtrlDispatcherW,ExitProcess,2_2_00A73360
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A73360 I_RegisterSvchostNotificationCallback,StartServiceCtrlDispatcherW,ExitProcess,2_2_00A73360
              Source: C:\Windows\SysWOW64\svchost.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\21c8026919fd094ab07ec3c180a9f210_9e146be9-c76a-4720-bcdb-53011b87bd06Jump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeMutant created: \Sessions\1\BaseNamedObjects\FDD42EE188E931437F4FBE2C
              Source: C:\Users\user\Desktop\Payment Record.exeFile created: C:\Users\user\AppData\Local\Temp\autC98E.tmpJump to behavior
              Source: Payment Record.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\Payment Record.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: svchost.exe, 00000002.00000003.2129158378.0000000005005000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
              Source: Payment Record.exeReversingLabs: Detection: 36%
              Source: Payment Record.exeVirustotal: Detection: 29%
              Source: unknownProcess created: C:\Users\user\Desktop\Payment Record.exe "C:\Users\user\Desktop\Payment Record.exe"
              Source: C:\Users\user\Desktop\Payment Record.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\Payment Record.exe"
              Source: C:\Users\user\Desktop\Payment Record.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\Payment Record.exe"Jump to behavior
              Source: C:\Users\user\Desktop\Payment Record.exeSection loaded: wsock32.dllJump to behavior
              Source: C:\Users\user\Desktop\Payment Record.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\Payment Record.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\Desktop\Payment Record.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Users\user\Desktop\Payment Record.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\Desktop\Payment Record.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\Payment Record.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\Payment Record.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\Payment Record.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\Payment Record.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\Payment Record.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: vaultcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: netapi32.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: samcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: samlib.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\OutlookJump to behavior
              Source: Payment Record.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
              Source: Payment Record.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
              Source: Payment Record.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
              Source: Payment Record.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: Payment Record.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
              Source: Payment Record.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
              Source: Payment Record.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: Binary string: wntdll.pdbUGP source: Payment Record.exe, 00000000.00000003.2127326000.0000000003980000.00000004.00001000.00020000.00000000.sdmp, Payment Record.exe, 00000000.00000003.2126483693.0000000003B20000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdb source: Payment Record.exe, 00000000.00000003.2127326000.0000000003980000.00000004.00001000.00020000.00000000.sdmp, Payment Record.exe, 00000000.00000003.2126483693.0000000003B20000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: svchost.pdb source: svchost.exe, svchost.exe, 00000002.00000002.3366251258.0000000000A71000.00000020.00000001.01000000.00000005.sdmp
              Source: Binary string: svchost.pdbUGP source: svchost.exe, 00000002.00000002.3366251258.0000000000A71000.00000020.00000001.01000000.00000005.sdmp
              Source: Payment Record.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
              Source: Payment Record.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
              Source: Payment Record.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
              Source: Payment Record.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
              Source: Payment Record.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

              Data Obfuscation

              barindex
              Source: Yara matchFile source: 0.2.Payment Record.exe.1080000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.Payment Record.exe.1080000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.2129598847.0000000001080000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.3366156712.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Payment Record.exe PID: 5952, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 320, type: MEMORYSTR
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_006A4B37 LoadLibraryA,GetProcAddress,0_2_006A4B37
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_006C8945 push ecx; ret 0_2_006C8958
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_006ACBB2 push 00000000h; retf 0_2_006ACBB4
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_006AB5E0 push 00000000h; ret 0_2_006AB5E4
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_01081EC0 push eax; ret 0_2_01081ED4
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_01081EC0 push eax; ret 0_2_01081EFC
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00402AC0 push eax; ret 2_2_00402AD4
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00402AC0 push eax; ret 2_2_00402AFC
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A73360 I_RegisterSvchostNotificationCallback,StartServiceCtrlDispatcherW,ExitProcess,2_2_00A73360
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_006A48D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_006A48D7
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_00725376 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00725376
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_006C3187 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_006C3187
              Source: C:\Users\user\Desktop\Payment Record.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\Payment Record.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: C:\Users\user\Desktop\Payment Record.exeAPI/Special instruction interceptor: Address: 10E14BC
              Source: C:\Users\user\Desktop\Payment Record.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-110468
              Source: C:\Users\user\Desktop\Payment Record.exeAPI coverage: 4.4 %
              Source: C:\Windows\SysWOW64\svchost.exe TID: 3660Thread sleep time: -660000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_0070445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_0070445A
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_0070C6D1 FindFirstFileW,FindClose,0_2_0070C6D1
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_0070C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_0070C75C
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_0070EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0070EF95
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_0070F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_0070F0F2
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_0070F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0070F3F3
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_007037EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_007037EF
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_00703B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00703B12
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_0070BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_0070BCBC
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00403D74 FindFirstFileW,FindNextFileW,FindFirstFileW,FindNextFileW,2_2_00403D74
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_006A49A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_006A49A0
              Source: C:\Windows\SysWOW64\svchost.exeThread delayed: delay time: 60000Jump to behavior
              Source: svchost.exe, 00000002.00000002.3366671040.0000000003012000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_00713F09 BlockInput,0_2_00713F09
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_006A3B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_006A3B3A
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_006D5A7C EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_006D5A7C
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_006A4B37 LoadLibraryA,GetProcAddress,0_2_006A4B37
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_010E0108 mov eax, dword ptr fs:[00000030h]0_2_010E0108
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_0108257B mov eax, dword ptr fs:[00000030h]0_2_0108257B
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_010E1728 mov eax, dword ptr fs:[00000030h]0_2_010E1728
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_010E1788 mov eax, dword ptr fs:[00000030h]0_2_010E1788
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_0040317B mov eax, dword ptr fs:[00000030h]2_2_0040317B
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A74410 mov eax, dword ptr fs:[00000030h]2_2_00A74410
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A74410 mov eax, dword ptr fs:[00000030h]2_2_00A74410
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A73060 mov eax, dword ptr fs:[00000030h]2_2_00A73060
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A73060 mov eax, dword ptr fs:[00000030h]2_2_00A73060
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A73060 mov eax, dword ptr fs:[00000030h]2_2_00A73060
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A73060 mov eax, dword ptr fs:[00000030h]2_2_00A73060
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A73540 mov eax, dword ptr fs:[00000030h]2_2_00A73540
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A73540 mov eax, dword ptr fs:[00000030h]2_2_00A73540
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A73540 mov eax, dword ptr fs:[00000030h]2_2_00A73540
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A756A0 mov eax, dword ptr fs:[00000030h]2_2_00A756A0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A756A0 mov ecx, dword ptr fs:[00000030h]2_2_00A756A0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A74610 mov eax, dword ptr fs:[00000030h]2_2_00A74610
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A74610 mov eax, dword ptr fs:[00000030h]2_2_00A74610
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A74610 mov eax, dword ptr fs:[00000030h]2_2_00A74610
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A74610 mov eax, dword ptr fs:[00000030h]2_2_00A74610
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_006F80A9 GetTokenInformation,GetLastError,GetProcessHeap,HeapAlloc,GetTokenInformation,0_2_006F80A9
              Source: C:\Windows\SysWOW64\svchost.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_006CA155 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_006CA155
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_006CA124 SetUnhandledExceptionFilter,0_2_006CA124
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A75848 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_00A75848
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A733C0 NtSetInformationProcess,SetUnhandledExceptionFilter,SetErrorMode,GetProcessHeap,InitializeSRWLock,InitializeSRWLock,RegDisablePredefinedCacheEx,EtwEventRegister,GetCommandLineW,memset,GetCurrentProcess,NtSetInformationProcess,HeapFree,HeapFree,ExitProcess,GetCurrentProcess,SetProcessAffinityUpdateMode,2_2_00A733C0

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Windows\SysWOW64\svchost.exeNetwork Connect: 104.21.16.1 80Jump to behavior
              Source: C:\Users\user\Desktop\Payment Record.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
              Source: C:\Users\user\Desktop\Payment Record.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 2CB7008Jump to behavior
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_006F87B1 LogonUserW,0_2_006F87B1
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_006A3B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_006A3B3A
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_006A48D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_006A48D7
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_00704C7F mouse_event,0_2_00704C7F
              Source: C:\Users\user\Desktop\Payment Record.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\Payment Record.exe"Jump to behavior
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_006F7CAF GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_006F7CAF
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_006F874B AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_006F874B
              Source: Payment Record.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
              Source: Payment Record.exeBinary or memory string: Shell_TrayWnd
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_006C862B cpuid 0_2_006C862B
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_006D4E87 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_006D4E87
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_006E1E06 GetUserNameW,0_2_006E1E06
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_006D3F3A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_006D3F3A
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_006A49A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_006A49A0
              Source: C:\Windows\SysWOW64\svchost.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 0.2.Payment Record.exe.1080000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.2129598847.0000000001080000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.3366156712.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Payment Record.exe PID: 5952, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 320, type: MEMORYSTR
              Source: Yara matchFile source: dump.pcap, type: PCAP
              Source: Yara matchFile source: 00000002.00000002.3366643257.0000000003000000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\9bis.com\KiTTY\SessionsJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Martin PrikrylJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeFile opened: HKEY_CURRENT_USER\Software\Far2\Plugins\FTP\HostsJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeFile opened: HKEY_CURRENT_USER\Software\NCH Software\ClassicFTP\FTPAccountsJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeFile opened: HKEY_CURRENT_USER\Software\FlashPeak\BlazeFtp\SettingsJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeFile opened: HKEY_CURRENT_USER\Software\Far\Plugins\FTP\HostsJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\OutlookJump to behavior
              Source: C:\Windows\SysWOW64\svchost.exeCode function: PopPassword2_2_0040D069
              Source: C:\Windows\SysWOW64\svchost.exeCode function: SmtpPassword2_2_0040D069
              Source: Payment Record.exeBinary or memory string: WIN_81
              Source: Payment Record.exeBinary or memory string: WIN_XP
              Source: Payment Record.exeBinary or memory string: WIN_XPe
              Source: Payment Record.exeBinary or memory string: WIN_VISTA
              Source: Payment Record.exeBinary or memory string: WIN_7
              Source: Payment Record.exeBinary or memory string: WIN_8
              Source: Payment Record.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 0USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte
              Source: Yara matchFile source: 0.2.Payment Record.exe.1080000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.2129598847.0000000001080000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.3366156712.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Payment Record.exe PID: 5952, type: MEMORYSTR
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_00716283 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_00716283
              Source: C:\Users\user\Desktop\Payment Record.exeCode function: 0_2_00716747 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00716747
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A76AF0 EnterCriticalSection,RpcServerListen,LeaveCriticalSection,I_RpcMapWin32Status,2_2_00A76AF0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A76BB0 RpcServerUnregisterIfEx,EnterCriticalSection,RpcMgmtStopServerListening,RpcMgmtWaitServerListen,LeaveCriticalSection,I_RpcMapWin32Status,2_2_00A76BB0
              Source: C:\Windows\SysWOW64\svchost.exeCode function: 2_2_00A76B60 RpcServerUnregisterIf,EnterCriticalSection,RpcMgmtStopServerListening,RpcMgmtWaitServerListen,LeaveCriticalSection,I_RpcMapWin32Status,2_2_00A76B60
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire Infrastructure2
              Valid Accounts
              2
              Native API
              1
              DLL Side-Loading
              1
              Exploitation for Privilege Escalation
              1
              Disable or Modify Tools
              2
              OS Credential Dumping
              2
              System Time Discovery
              Remote Services1
              Archive Collected Data
              3
              Ingress Tool Transfer
              Exfiltration Over Other Network Medium1
              System Shutdown/Reboot
              CredentialsDomainsDefault Accounts2
              Service Execution
              2
              Valid Accounts
              1
              DLL Side-Loading
              1
              Deobfuscate/Decode Files or Information
              21
              Input Capture
              1
              Account Discovery
              Remote Desktop Protocol2
              Data from Local System
              1
              Encrypted Channel
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAt3
              Windows Service
              2
              Valid Accounts
              2
              Obfuscated Files or Information
              2
              Credentials in Registry
              1
              File and Directory Discovery
              SMB/Windows Admin Shares1
              Email Collection
              3
              Non-Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
              Access Token Manipulation
              1
              DLL Side-Loading
              NTDS117
              System Information Discovery
              Distributed Component Object Model21
              Input Capture
              113
              Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script3
              Windows Service
              1
              Masquerading
              LSA Secrets131
              Security Software Discovery
              SSH3
              Clipboard Data
              Fallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts312
              Process Injection
              2
              Valid Accounts
              Cached Domain Credentials11
              Virtualization/Sandbox Evasion
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
              Virtualization/Sandbox Evasion
              DCSync2
              Process Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
              Access Token Manipulation
              Proc Filesystem1
              Application Window Discovery
              Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt312
              Process Injection
              /etc/passwd and /etc/shadow1
              System Owner/User Discovery
              Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              Payment Record.exe37%ReversingLabsWin32.Trojan.AutoitInject
              Payment Record.exe30%VirustotalBrowse
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              http://alphastand.win/alien/fre.php100%Avira URL Cloudmalware
              http://kbfvzoboss.bid/alien/fre.php100%Avira URL Cloudphishing
              http://alphastand.trade/alien/fre.php100%Avira URL Cloudmalware
              http://www.ibsensoftware.com/0%Avira URL Cloudsafe
              http://alphastand.top/alien/fre.php100%Avira URL Cloudmalware
              NameIPActiveMaliciousAntivirus DetectionReputation
              touxzw.ir
              104.21.16.1
              truefalse
                high
                NameMaliciousAntivirus DetectionReputation
                http://touxzw.ir/sccc/five/fre.phpfalse
                  high
                  http://kbfvzoboss.bid/alien/fre.phptrue
                  • Avira URL Cloud: phishing
                  unknown
                  http://alphastand.win/alien/fre.phptrue
                  • Avira URL Cloud: malware
                  unknown
                  http://alphastand.trade/alien/fre.phptrue
                  • Avira URL Cloud: malware
                  unknown
                  http://alphastand.top/alien/fre.phptrue
                  • Avira URL Cloud: malware
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://www.ibsensoftware.com/svchost.exe, svchost.exe, 00000002.00000002.3366156712.0000000000400000.00000040.80000000.00040000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  104.21.16.1
                  touxzw.irUnited States
                  13335CLOUDFLARENETUSfalse
                  Joe Sandbox version:42.0.0 Malachite
                  Analysis ID:1630614
                  Start date and time:2025-03-06 04:02:51 +01:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 5m 10s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:5
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:Payment Record.exe
                  Detection:MAL
                  Classification:mal100.troj.spyw.evad.winEXE@3/4@1/1
                  EGA Information:
                  • Successful, ratio: 100%
                  HCA Information:
                  • Successful, ratio: 100%
                  • Number of executed functions: 47
                  • Number of non-executed functions: 285
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                  • Excluded IPs from analysis (whitelisted): 13.107.246.60, 20.12.23.50
                  • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, 6.0.1.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.0.7.0.0.0.0.3.0.1.3.0.6.2.ip6.arpa, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                  • Report size exceeded maximum capacity and may have missing disassembly code.
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  TimeTypeDescription
                  22:03:48API Interceptor62x Sleep call for process: svchost.exe modified
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  104.21.16.1Invoice Remittance ref27022558.exeGet hashmaliciousFormBookBrowse
                  • www.rbopisalive.cyou/a669/
                  ujXpculHYDYhc6i.exeGet hashmaliciousLokibotBrowse
                  • touxzw.ir/sss2/five/fre.php
                  368c6e62-b031-5b65-fd43-e7a610184138.emlGet hashmaliciousHTMLPhisherBrowse
                  • ce60771026585.oakdiiocese.org/p/298?session=770558a25b5d1fcbb8d81f113631d430f5b8d022cdc6d97cf6b16a412a3be9e6
                  http://orico-rapaciid.xqyrr.cn/eorico/login/Get hashmaliciousUnknownBrowse
                  • orico-rapaciid.xqyrr.cn/favicon.ico
                  Order confirmation.exeGet hashmaliciousFormBookBrowse
                  • www.englishmaterials.net/3nop/?-Z=cjlpd&Vz=5VQMUr9vdJst/aGqnmtehORilpahgrSgoeoRp4hSLdasMjOC27ijg2BR7Ep4jmwJ4Zkm
                  Bank Transfer Accounting Copy.Vbs.vbsGet hashmaliciousFormBookBrowse
                  • www.fz977.xyz/48bq/
                  PO from tpc Type 34.1 34,2 35 Spec.jsGet hashmaliciousFormBookBrowse
                  • www.lucynoel6465.shop/jgkl/
                  PO from tpc Type 34.1 34,2 35 Spec 1.jsGet hashmaliciousFormBookBrowse
                  • www.tumbetgirislinki.fit/k566/
                  ebu.ps1Get hashmaliciousFormBookBrowse
                  • www.fz977.xyz/48bq/
                  BIS_MT103 101T000000121121.exeGet hashmaliciousFormBookBrowse
                  • www.cheapwil.shop/ekxu/
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  touxzw.irPayment receipt PO 1437 1_ Payment receipt PO #1437 2.exeGet hashmaliciousLokibotBrowse
                  • 104.21.64.1
                  ORDER-000291-XLSX.exeGet hashmaliciousLokibotBrowse
                  • 104.21.112.1
                  Quotation_Order_Request_pdf.bat.exeGet hashmaliciousLokibotBrowse
                  • 104.21.112.1
                  PRI_VTK250419A.exeGet hashmaliciousLokibotBrowse
                  • 104.21.32.1
                  Payment.exeGet hashmaliciousLokibotBrowse
                  • 104.21.64.1
                  ujXpculHYDYhc6i.exeGet hashmaliciousLokibotBrowse
                  • 104.21.16.1
                  PRI_VTK250419A.exeGet hashmaliciousLokibotBrowse
                  • 104.21.80.1
                  7RryusxiMtHBz80.exeGet hashmaliciousLokibotBrowse
                  • 104.21.64.1
                  PO.exeGet hashmaliciousLokibotBrowse
                  • 104.21.96.1
                  OEoRzjI7JgSiUUd.exeGet hashmaliciousLokibotBrowse
                  • 104.21.96.1
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  CLOUDFLARENETUSdatasheet.pdf.exeGet hashmaliciousAgentTeslaBrowse
                  • 172.67.74.152
                  Play__(Mimi.merhi)__Now_AUD__autoresponse_}.svgGet hashmaliciousHTMLPhisherBrowse
                  • 104.21.64.127
                  New order BPD-003666.exeGet hashmaliciousFormBookBrowse
                  • 172.67.222.201
                  nabmpsl.elfGet hashmaliciousUnknownBrowse
                  • 1.13.92.239
                  nklx86.elfGet hashmaliciousUnknownBrowse
                  • 104.29.0.183
                  nklsh4.elfGet hashmaliciousUnknownBrowse
                  • 1.12.59.178
                  z15NEWORDERSUPPLY0490402.exeGet hashmaliciousFormBookBrowse
                  • 172.67.187.182
                  http://paytrace.comGet hashmaliciousUnknownBrowse
                  • 104.17.223.152
                  http://goddyusmall.com/cdn/shop/prev/32ce041007058889bd9ccb8b22ade877/1740465394868/assets/component-quantity-input.jsGet hashmaliciousUnknownBrowse
                  • 104.17.232.29
                  https://shared.outlook.inky.com/link?domain=uniqueattestation.com&t=h.eJxVjsESgjAQQ3_F6dmhbCmUcuJXVroKUluERWUc_13LzWMySV7eYp29aA6iZ56WRso1DPeVkJkWRh5iyLp4k44eUhwPYkzRQBzniy2htEUhR5wptOhxGXEj7-PTDcuE3PV701hNYFDVJ6NtrZTL7RnQFAqANFgtwWj4iVzprKxqbSqTQJRA17i1_Uque6WpZLv96p_F6T58vkzDPI8.MEQCIFg5ypqbt4YK0JYR-PloKBuDzDQnhOwv9NMnk8bWqCL-AiAXyhaPfHl8_8J--pKjHt82a42BzYij9hHt4B5C12_IIgGet hashmaliciousHTMLPhisher, Invisible JSBrowse
                  • 104.16.2.189
                  No context
                  No context
                  Process:C:\Users\user\Desktop\Payment Record.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):81202
                  Entropy (8bit):7.950026673840645
                  Encrypted:false
                  SSDEEP:1536:3WjHRlBjBhTQQbnr1QxWLl5bpnw2EVxnGhA87H+2DNQKwRagDOPRCDtAF:3yllB1QMQxWLl5bpn557TDNQKUuCDc
                  MD5:FB968E514434B832F43D6DCEE19AE120
                  SHA1:A31AF15491DC904BAB73FE5D2648E8A36A964E66
                  SHA-256:45731325B713424ED574B09ABE0583F37E500F3B717A4AA8B1E6A93A19D1889C
                  SHA-512:9D0BD40DE84858C2B78708BE37118002D18730AF283FD038E24F09AF114AE2143CE00C7652CD2B413CF4B2281554BAAA275EF26008E6BFE89A75C288C3DBD5D2
                  Malicious:false
                  Reputation:low
                  Preview:EA06......;.*..m0..j..n.N..f..E..B.L(..D.O.Q...6...8..Ef.....T.$W.I.f,v*..w.P$...I...e..m.!%.]..y..O).. 1...[R..g...X.#8L|.y..Ts.......T|.\.w...H3..s...||.L....P....1..$...^..2.\.;3A..u...."..r..~.. .Z8.-..!..`..(.ri2..$....]h.X.nmO.Q.q...i.J..C.Q.3Zu#.]..69.>.^.6#...I@?.m>.B..@.......u6.4..$b.5...T..:.Y.Zh.).......N..uj.X.[.......i.,...M.........lf...Q..>.E..".P.uI..eO..?3..$!5`....8..g.9..H.D(.*..o0......8.....X....K6 .&.Z.[...L........`._..2...r.Uy...#..>...7.M.....C.C..4S....C.61Tj... .O}...c.C.....w.>.H2..3o..Pq.@...2.^...@..K.6..m1..eU,U.....).Z.^.6...p...J.....E+."..3.j}.O..&t.......j.y.~.N.Z+..Y..........UT.k]P.........H.U(S.n.q...8...G.T.Uh\.-k}.M...?..0.R Y...iG.....7>.M.S.s..m..Kju....R...G*...e..O:...lg....L.lw.r.]>...mjT..V...o.../8.i.]0;].nb..N.\^5d.H..+S 3.!.....E;.......>.2..i.\O+....7(..}..M.Q.......9:..Fc...z.h.3mF.q9.j..{...7....{...)....o/......V..!...$.h.m(..G.._..7....y....O......b...z.B.Qk.!..s.....r .#..........a....;._.i...X
                  Process:C:\Users\user\Desktop\Payment Record.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):106496
                  Entropy (8bit):7.430673258975776
                  Encrypted:false
                  SSDEEP:3072:lKC7neiKphRjAzfeHF5yLsBKdf2YLF9a+pfkxaV:llneiKphRjAZIBKdf2yF/pfkkV
                  MD5:325917AA5E360752A72F823AB08C966A
                  SHA1:2357D2A98B5420C123C9E4DC937126BF3AF4C950
                  SHA-256:914101A46E0E4EE7EF7EB1D8F0B8492A34EF124B1BCE1A5FD205EBD1CA04521D
                  SHA-512:4F4FFA018FA62853896ED1DE3E82E119EF17A7FCCA7FFED2BA58AA2ECA60F4111E32CDB37E55D4D8D471E05E0B6C76AB390135DC10C05ED7677BB6EDC4F20F72
                  Malicious:false
                  Reputation:low
                  Preview:y..BVB60C5WZ.ON.I4NHBUBv0G5WZ2OONGI4NHBUB60G5WZ2OONGI4NHBUB.0G5YE.AO.N...I..cbX.Fw*@ (<&$.-),;-B.%Pw(G!o')ip..b8-RUi8ZP.OONGI4N..-...Q...$...Q..... .......Y...-...C.......$...Q..^.....A...X.."....Q.jh...Q..|.... ..\42..Y.GI4NHBUBfuG5.[6O.F+.4NHBUB60.5T[9NCNGq5NH.]B60G5.c3OO^GI4.IBUBv0G%WZ2MONBI5NHBUB30F5WZ2OOnMI4JHBUB60E5W.2O_NGY4NHBEB6 G5WZ2O_NGI4NHBUB60..VZVOONGI4NHBUB60G5WZ2OONGI4NHBUB60G5WZ2OONGI4NHBUB60G5WZ2OONGI4NHBUB60G5WZ2OONGI4NHBUB6`F5.Z2OONGI4NHBUB60G5WZ2OONGI4Nf60:B0G5.l3OO^GI4vIBUF60G5WZ2OONGI4NhBU".B#T#;2O/.GI4.IBU.60G.VZ2OONGI4NHBUBv0Guy>S;.NGI..@BU.70G7WZ21NNGI4NHBUB60G5.Z2.a6GI4NHBUb60G5]Z2oONG.5NHBUB60G5WZ2OONG.4NHBUB60G5WZ2OONGI4NHBUB60G5WZ2OONGI4NHBUB60G5WZ2OONGI4NHBUB60G5WZ2OONGI4NHBUB60G5WZ2OONGI4NHBUB60G5WZ2OONGI4NHBUB60G5WZ2OONGI4NHBUB60G5WZ2OONGI4NHBUB60G5WZ2OONGI4NHBUB60G5WZ2OONGI4NHBUB60G5WZ2OONGI4NHBUB60G5WZ2OONGI4NHBUB60G5WZ2OONGI4NHBUB60G5WZ2OONGI4NHBUB60G5WZ2OONGI4NHBUB60G5WZ2OONGI4NHBUB60G5WZ2OONGI4NHBUB60G5WZ2OONGI4NHBUB60G5WZ2OONGI4NHBUB60G5
                  Process:C:\Windows\SysWOW64\svchost.exe
                  File Type:very short file (no magic)
                  Category:dropped
                  Size (bytes):1
                  Entropy (8bit):0.0
                  Encrypted:false
                  SSDEEP:3:U:U
                  MD5:C4CA4238A0B923820DCC509A6F75849B
                  SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                  SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                  SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                  Malicious:false
                  Reputation:high, very likely benign file
                  Preview:1
                  Process:C:\Windows\SysWOW64\svchost.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):49
                  Entropy (8bit):1.2701062923235522
                  Encrypted:false
                  SSDEEP:3:/l1PL3n:fPL3
                  MD5:CD8FA61AD2906643348EEF98A988B873
                  SHA1:0B10E2F323B5C73F3A6EA348633B62AE522DDF39
                  SHA-256:49A11A24821F2504B8C91BA9D8A6BD6F421ED2F0212C1C771BF1CAC9DE32AD75
                  SHA-512:1E6F44AB3231232221CF0F4268E96A13C82E3F96249D7963B78805B693B52D3EBDABF873DB240813DF606D8C207BD2859338D67BA94F33ECBA43EA9A4FEFA086
                  Malicious:false
                  Reputation:moderate, very likely benign file
                  Preview:........................................user.
                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                  Entropy (8bit):6.896056945999346
                  TrID:
                  • Win32 Executable (generic) a (10002005/4) 99.96%
                  • Generic Win/DOS Executable (2004/3) 0.02%
                  • DOS Executable Generic (2002/1) 0.02%
                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                  File name:Payment Record.exe
                  File size:992'256 bytes
                  MD5:dd113368367877e6e6e2c38d1793629e
                  SHA1:a009d3de4a591b136a2b6128fad0e00bb72cb513
                  SHA256:4f2274eda30670db71874bec8a27f08a103472c6dea4e1df892d621f05edaaf7
                  SHA512:eb6665d380cdfabfc036ec62ab6d9f9f4864be0133f1e068f55706cf54a78854f883f828c9cdf95b2d290a4f017460f32f91bb7339d16d49857bd7b451a0c7ca
                  SSDEEP:24576:Eu6J33O0c+JY5UZ+XC0kGso6FafQj6oQodk0jWY:+u0c++OCvkGs9Faf6oY
                  TLSH:E325AE2273DDC360CB769173BF6AB7016EBF38614630B95B2F880D7DA950162162D7A3
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......6...r}..r}..r}..4,".p}......s}.../..A}.../#..}.../".G}..{.@.{}..{.P.W}..r}..R.....)."}......s}.../..s}..r}T.s}......s}..Richr}.
                  Icon Hash:aaf3e3e3938382a0
                  Entrypoint:0x427dcd
                  Entrypoint Section:.text
                  Digitally signed:false
                  Imagebase:0x400000
                  Subsystem:windows gui
                  Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                  DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                  Time Stamp:0x67C90349 [Thu Mar 6 02:07:05 2025 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:5
                  OS Version Minor:1
                  File Version Major:5
                  File Version Minor:1
                  Subsystem Version Major:5
                  Subsystem Version Minor:1
                  Import Hash:afcdf79be1557326c854b6e20cb900a7
                  Instruction
                  call 00007F1C0CC7108Ah
                  jmp 00007F1C0CC63E54h
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  int3
                  push edi
                  push esi
                  mov esi, dword ptr [esp+10h]
                  mov ecx, dword ptr [esp+14h]
                  mov edi, dword ptr [esp+0Ch]
                  mov eax, ecx
                  mov edx, ecx
                  add eax, esi
                  cmp edi, esi
                  jbe 00007F1C0CC63FDAh
                  cmp edi, eax
                  jc 00007F1C0CC6433Eh
                  bt dword ptr [004C31FCh], 01h
                  jnc 00007F1C0CC63FD9h
                  rep movsb
                  jmp 00007F1C0CC642ECh
                  cmp ecx, 00000080h
                  jc 00007F1C0CC641A4h
                  mov eax, edi
                  xor eax, esi
                  test eax, 0000000Fh
                  jne 00007F1C0CC63FE0h
                  bt dword ptr [004BE324h], 01h
                  jc 00007F1C0CC644B0h
                  bt dword ptr [004C31FCh], 00000000h
                  jnc 00007F1C0CC6417Dh
                  test edi, 00000003h
                  jne 00007F1C0CC6418Eh
                  test esi, 00000003h
                  jne 00007F1C0CC6416Dh
                  bt edi, 02h
                  jnc 00007F1C0CC63FDFh
                  mov eax, dword ptr [esi]
                  sub ecx, 04h
                  lea esi, dword ptr [esi+04h]
                  mov dword ptr [edi], eax
                  lea edi, dword ptr [edi+04h]
                  bt edi, 03h
                  jnc 00007F1C0CC63FE3h
                  movq xmm1, qword ptr [esi]
                  sub ecx, 08h
                  lea esi, dword ptr [esi+08h]
                  movq qword ptr [edi], xmm1
                  lea edi, dword ptr [edi+08h]
                  test esi, 00000007h
                  je 00007F1C0CC64035h
                  bt esi, 03h
                  jnc 00007F1C0CC64088h
                  Programming Language:
                  • [ASM] VS2013 build 21005
                  • [ C ] VS2013 build 21005
                  • [C++] VS2013 build 21005
                  • [ C ] VS2008 SP1 build 30729
                  • [IMP] VS2008 SP1 build 30729
                  • [ASM] VS2013 UPD4 build 31101
                  • [RES] VS2013 build 21005
                  • [LNK] VS2013 UPD4 build 31101
                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IMPORT0xba44c0x17c.rdata
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xc70000x29bd4.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0xf10000x711c.reloc
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x92bc00x1c.rdata
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa48700x40.rdata
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x8f0000x884.rdata
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x10000x8dcc40x8de00d28a820a1d9ff26cda02d12b888ba4b4False0.5728679102422908data6.676118058520316IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  .rdata0x8f0000x2e10e0x2e20079b14b254506b0dbc8cd0ad67fb70ad9False0.33535526761517614OpenPGP Public Key5.76010872795207IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .data0xbe0000x8f740x52009f9d6f746f1a415a63de45f8b7983d33False0.1017530487804878data1.198745897703538IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                  .rsrc0xc70000x29bd40x29c00e68d1f077802cbe4f05f00e06fb1bebbFalse0.8434693113772455data7.667252023436939IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .reloc0xf10000x711c0x72006fcae3cbbf6bfbabf5ec5bbe7cf612c3False0.7650767543859649data6.779031650454199IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                  NameRVASizeTypeLanguageCountryZLIB Complexity
                  RT_ICON0xc75a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                  RT_ICON0xc76d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                  RT_ICON0xc77f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                  RT_ICON0xc79200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                  RT_ICON0xc7c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                  RT_ICON0xc7d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                  RT_ICON0xc8bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                  RT_ICON0xc94800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                  RT_ICON0xc99e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                  RT_ICON0xcbf900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                  RT_ICON0xcd0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                  RT_MENU0xcd4a00x50dataEnglishGreat Britain0.9
                  RT_STRING0xcd4f00x594dataEnglishGreat Britain0.3333333333333333
                  RT_STRING0xcda840x68adataEnglishGreat Britain0.2747909199522103
                  RT_STRING0xce1100x490dataEnglishGreat Britain0.3715753424657534
                  RT_STRING0xce5a00x5fcdataEnglishGreat Britain0.3087467362924282
                  RT_STRING0xceb9c0x65cdataEnglishGreat Britain0.34336609336609336
                  RT_STRING0xcf1f80x466dataEnglishGreat Britain0.3605683836589698
                  RT_STRING0xcf6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                  RT_RCDATA0xcf7b80x20e9bdata1.0003783074081491
                  RT_GROUP_ICON0xf06540x76dataEnglishGreat Britain0.6610169491525424
                  RT_GROUP_ICON0xf06cc0x14dataEnglishGreat Britain1.25
                  RT_GROUP_ICON0xf06e00x14dataEnglishGreat Britain1.15
                  RT_GROUP_ICON0xf06f40x14dataEnglishGreat Britain1.25
                  RT_VERSION0xf07080xdcdataEnglishGreat Britain0.6181818181818182
                  RT_MANIFEST0xf07e40x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                  DLLImport
                  WSOCK32.dllWSACleanup, socket, inet_ntoa, setsockopt, ntohs, recvfrom, ioctlsocket, htons, WSAStartup, __WSAFDIsSet, select, accept, listen, bind, closesocket, WSAGetLastError, recv, sendto, send, inet_addr, gethostbyname, gethostname, connect
                  VERSION.dllGetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW
                  WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                  COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                  MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
                  WININET.dllInternetQueryDataAvailable, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetConnectW
                  PSAPI.DLLGetProcessMemoryInfo
                  IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
                  USERENV.dllDestroyEnvironmentBlock, UnloadUserProfile, CreateEnvironmentBlock, LoadUserProfileW
                  UxTheme.dllIsThemeActive
                  KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, SetCurrentDirectoryW, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, GetCurrentThread, CloseHandle, GetFullPathNameW, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, FindClose, SetEnvironmentVariableA
                  USER32.dllAdjustWindowRectEx, CopyImage, SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, SetRect, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, MonitorFromRect, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, UnregisterHotKey, CheckMenuRadioItem, CharLowerBuffW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, LoadImageW, GetClassNameW
                  GDI32.dllStrokePath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, GetDeviceCaps, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, DeleteDC, GetPixel, CreateDCW, GetStockObject, GetTextFaceW, CreateFontW, SetTextColor, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, StrokeAndFillPath
                  COMDLG32.dllGetOpenFileNameW, GetSaveFileNameW
                  ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, RegCreateKeyExW, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, AddAce, SetSecurityDescriptorDacl, GetUserNameW, InitiateSystemShutdownExW
                  SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                  ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoSetProxyBlanket, CoCreateInstanceEx, CoInitializeSecurity
                  OLEAUT32.dllLoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, RegisterTypeLib, CreateStdDispatch, DispCallFunc, VariantChangeType, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, VariantCopy, VariantClear, OleLoadPicture, QueryPathOfRegTypeLib, RegisterTypeLibForUser, UnRegisterTypeLibForUser, UnRegisterTypeLib, CreateDispTypeInfo, SysAllocString, VariantInit
                  DescriptionData
                  Translation0x0809 0x04b0
                  Language of compilation systemCountry where language is spokenMap
                  EnglishGreat Britain
                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                  2025-03-06T04:03:45.735358+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.649709104.21.16.180TCP
                  2025-03-06T04:03:45.735358+01002025381ET MALWARE LokiBot Checkin1192.168.2.649709104.21.16.180TCP
                  2025-03-06T04:03:45.735358+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.649709104.21.16.180TCP
                  2025-03-06T04:03:46.500574+01002024312ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M11192.168.2.649709104.21.16.180TCP
                  2025-03-06T04:03:47.665765+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.649710104.21.16.180TCP
                  2025-03-06T04:03:47.665765+01002025381ET MALWARE LokiBot Checkin1192.168.2.649710104.21.16.180TCP
                  2025-03-06T04:03:47.665765+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.649710104.21.16.180TCP
                  2025-03-06T04:03:48.473141+01002024312ET MALWARE LokiBot Application/Credential Data Exfiltration Detected M11192.168.2.649710104.21.16.180TCP
                  2025-03-06T04:03:48.542508+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.649711104.21.16.180TCP
                  2025-03-06T04:03:48.542508+01002025381ET MALWARE LokiBot Checkin1192.168.2.649711104.21.16.180TCP
                  2025-03-06T04:03:48.542508+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.649711104.21.16.180TCP
                  2025-03-06T04:03:49.277970+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.649711104.21.16.180TCP
                  2025-03-06T04:03:50.566688+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.649713104.21.16.180TCP
                  2025-03-06T04:03:50.566688+01002025381ET MALWARE LokiBot Checkin1192.168.2.649713104.21.16.180TCP
                  2025-03-06T04:03:50.566688+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.649713104.21.16.180TCP
                  2025-03-06T04:03:51.278511+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.649713104.21.16.180TCP
                  2025-03-06T04:03:52.446459+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.649714104.21.16.180TCP
                  2025-03-06T04:03:52.446459+01002025381ET MALWARE LokiBot Checkin1192.168.2.649714104.21.16.180TCP
                  2025-03-06T04:03:52.446459+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.649714104.21.16.180TCP
                  2025-03-06T04:03:53.201624+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.649714104.21.16.180TCP
                  2025-03-06T04:03:53.206639+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.16.180192.168.2.649714TCP
                  2025-03-06T04:03:54.361622+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.649720104.21.16.180TCP
                  2025-03-06T04:03:54.361622+01002025381ET MALWARE LokiBot Checkin1192.168.2.649720104.21.16.180TCP
                  2025-03-06T04:03:54.361622+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.649720104.21.16.180TCP
                  2025-03-06T04:03:55.123302+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.649720104.21.16.180TCP
                  2025-03-06T04:03:55.128414+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.16.180192.168.2.649720TCP
                  2025-03-06T04:03:56.390014+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.649726104.21.16.180TCP
                  2025-03-06T04:03:56.390014+01002025381ET MALWARE LokiBot Checkin1192.168.2.649726104.21.16.180TCP
                  2025-03-06T04:03:56.390014+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.649726104.21.16.180TCP
                  2025-03-06T04:03:57.147922+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.649726104.21.16.180TCP
                  2025-03-06T04:03:57.153017+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.16.180192.168.2.649726TCP
                  2025-03-06T04:03:58.316473+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.649732104.21.16.180TCP
                  2025-03-06T04:03:58.316473+01002025381ET MALWARE LokiBot Checkin1192.168.2.649732104.21.16.180TCP
                  2025-03-06T04:03:58.316473+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.649732104.21.16.180TCP
                  2025-03-06T04:03:59.026601+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.649732104.21.16.180TCP
                  2025-03-06T04:04:00.195263+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.649737104.21.16.180TCP
                  2025-03-06T04:04:00.195263+01002025381ET MALWARE LokiBot Checkin1192.168.2.649737104.21.16.180TCP
                  2025-03-06T04:04:00.195263+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.649737104.21.16.180TCP
                  2025-03-06T04:04:00.976832+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.649737104.21.16.180TCP
                  2025-03-06T04:04:00.981839+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.16.180192.168.2.649737TCP
                  2025-03-06T04:04:02.151058+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.649742104.21.16.180TCP
                  2025-03-06T04:04:02.151058+01002025381ET MALWARE LokiBot Checkin1192.168.2.649742104.21.16.180TCP
                  2025-03-06T04:04:02.151058+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.649742104.21.16.180TCP
                  2025-03-06T04:04:02.919705+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.649742104.21.16.180TCP
                  2025-03-06T04:04:02.979119+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.16.180192.168.2.649742TCP
                  2025-03-06T04:04:04.265359+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.649749104.21.16.180TCP
                  2025-03-06T04:04:04.265359+01002025381ET MALWARE LokiBot Checkin1192.168.2.649749104.21.16.180TCP
                  2025-03-06T04:04:04.265359+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.649749104.21.16.180TCP
                  2025-03-06T04:04:05.043190+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.649749104.21.16.180TCP
                  2025-03-06T04:04:05.048261+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.16.180192.168.2.649749TCP
                  2025-03-06T04:04:06.201744+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.649755104.21.16.180TCP
                  2025-03-06T04:04:06.201744+01002025381ET MALWARE LokiBot Checkin1192.168.2.649755104.21.16.180TCP
                  2025-03-06T04:04:06.201744+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.649755104.21.16.180TCP
                  2025-03-06T04:04:06.955414+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.649755104.21.16.180TCP
                  2025-03-06T04:04:08.125482+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.649761104.21.16.180TCP
                  2025-03-06T04:04:08.125482+01002025381ET MALWARE LokiBot Checkin1192.168.2.649761104.21.16.180TCP
                  2025-03-06T04:04:08.125482+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.649761104.21.16.180TCP
                  2025-03-06T04:04:08.915335+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.649761104.21.16.180TCP
                  2025-03-06T04:04:08.920417+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.16.180192.168.2.649761TCP
                  2025-03-06T04:04:10.062674+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.649766104.21.16.180TCP
                  2025-03-06T04:04:10.062674+01002025381ET MALWARE LokiBot Checkin1192.168.2.649766104.21.16.180TCP
                  2025-03-06T04:04:10.062674+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.649766104.21.16.180TCP
                  2025-03-06T04:04:10.827213+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.649766104.21.16.180TCP
                  2025-03-06T04:04:10.832410+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.16.180192.168.2.649766TCP
                  2025-03-06T04:04:11.988824+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.649768104.21.16.180TCP
                  2025-03-06T04:04:11.988824+01002025381ET MALWARE LokiBot Checkin1192.168.2.649768104.21.16.180TCP
                  2025-03-06T04:04:11.988824+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.649768104.21.16.180TCP
                  2025-03-06T04:04:12.615447+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.649768104.21.16.180TCP
                  2025-03-06T04:04:12.623158+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.16.180192.168.2.649768TCP
                  2025-03-06T04:04:13.900262+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.649774104.21.16.180TCP
                  2025-03-06T04:04:13.900262+01002025381ET MALWARE LokiBot Checkin1192.168.2.649774104.21.16.180TCP
                  2025-03-06T04:04:13.900262+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.649774104.21.16.180TCP
                  2025-03-06T04:04:14.615177+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.649774104.21.16.180TCP
                  2025-03-06T04:04:15.812629+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.649780104.21.16.180TCP
                  2025-03-06T04:04:15.812629+01002025381ET MALWARE LokiBot Checkin1192.168.2.649780104.21.16.180TCP
                  2025-03-06T04:04:15.812629+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.649780104.21.16.180TCP
                  2025-03-06T04:04:16.574300+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.649780104.21.16.180TCP
                  2025-03-06T04:04:17.719575+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.649786104.21.16.180TCP
                  2025-03-06T04:04:17.719575+01002025381ET MALWARE LokiBot Checkin1192.168.2.649786104.21.16.180TCP
                  2025-03-06T04:04:17.719575+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.649786104.21.16.180TCP
                  2025-03-06T04:04:18.464485+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.649786104.21.16.180TCP
                  2025-03-06T04:04:19.687413+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.649790104.21.16.180TCP
                  2025-03-06T04:04:19.687413+01002025381ET MALWARE LokiBot Checkin1192.168.2.649790104.21.16.180TCP
                  2025-03-06T04:04:19.687413+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.649790104.21.16.180TCP
                  2025-03-06T04:04:20.458147+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.649790104.21.16.180TCP
                  2025-03-06T04:04:20.463127+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.16.180192.168.2.649790TCP
                  2025-03-06T04:04:21.613325+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.649793104.21.16.180TCP
                  2025-03-06T04:04:21.613325+01002025381ET MALWARE LokiBot Checkin1192.168.2.649793104.21.16.180TCP
                  2025-03-06T04:04:21.613325+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.649793104.21.16.180TCP
                  2025-03-06T04:04:22.374598+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.649793104.21.16.180TCP
                  2025-03-06T04:04:22.379707+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.16.180192.168.2.649793TCP
                  2025-03-06T04:04:23.536257+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.649799104.21.16.180TCP
                  2025-03-06T04:04:23.536257+01002025381ET MALWARE LokiBot Checkin1192.168.2.649799104.21.16.180TCP
                  2025-03-06T04:04:23.536257+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.649799104.21.16.180TCP
                  2025-03-06T04:04:24.265165+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.649799104.21.16.180TCP
                  2025-03-06T04:04:25.425745+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.649805104.21.16.180TCP
                  2025-03-06T04:04:25.425745+01002025381ET MALWARE LokiBot Checkin1192.168.2.649805104.21.16.180TCP
                  2025-03-06T04:04:25.425745+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.649805104.21.16.180TCP
                  2025-03-06T04:04:26.191302+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.649805104.21.16.180TCP
                  2025-03-06T04:04:26.196280+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.16.180192.168.2.649805TCP
                  2025-03-06T04:04:27.347257+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.649810104.21.16.180TCP
                  2025-03-06T04:04:27.347257+01002025381ET MALWARE LokiBot Checkin1192.168.2.649810104.21.16.180TCP
                  2025-03-06T04:04:27.347257+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.649810104.21.16.180TCP
                  2025-03-06T04:04:28.066550+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.649810104.21.16.180TCP
                  2025-03-06T04:04:29.224142+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.659051104.21.16.180TCP
                  2025-03-06T04:04:29.224142+01002025381ET MALWARE LokiBot Checkin1192.168.2.659051104.21.16.180TCP
                  2025-03-06T04:04:29.224142+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.659051104.21.16.180TCP
                  2025-03-06T04:04:29.989301+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.659051104.21.16.180TCP
                  2025-03-06T04:04:29.994388+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.16.180192.168.2.659051TCP
                  2025-03-06T04:04:31.359423+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.659055104.21.16.180TCP
                  2025-03-06T04:04:31.359423+01002025381ET MALWARE LokiBot Checkin1192.168.2.659055104.21.16.180TCP
                  2025-03-06T04:04:31.359423+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.659055104.21.16.180TCP
                  2025-03-06T04:04:32.111462+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.659055104.21.16.180TCP
                  2025-03-06T04:04:32.116545+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.16.180192.168.2.659055TCP
                  2025-03-06T04:04:33.266425+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.659060104.21.16.180TCP
                  2025-03-06T04:04:33.266425+01002025381ET MALWARE LokiBot Checkin1192.168.2.659060104.21.16.180TCP
                  2025-03-06T04:04:33.266425+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.659060104.21.16.180TCP
                  2025-03-06T04:04:34.035641+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.659060104.21.16.180TCP
                  2025-03-06T04:04:34.040572+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.16.180192.168.2.659060TCP
                  2025-03-06T04:04:35.188451+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.659066104.21.16.180TCP
                  2025-03-06T04:04:35.188451+01002025381ET MALWARE LokiBot Checkin1192.168.2.659066104.21.16.180TCP
                  2025-03-06T04:04:35.188451+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.659066104.21.16.180TCP
                  2025-03-06T04:04:35.968671+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.659066104.21.16.180TCP
                  2025-03-06T04:04:35.973703+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.16.180192.168.2.659066TCP
                  2025-03-06T04:04:37.317190+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.659071104.21.16.180TCP
                  2025-03-06T04:04:37.317190+01002025381ET MALWARE LokiBot Checkin1192.168.2.659071104.21.16.180TCP
                  2025-03-06T04:04:37.317190+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.659071104.21.16.180TCP
                  2025-03-06T04:04:38.076811+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.659071104.21.16.180TCP
                  2025-03-06T04:04:38.081835+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.16.180192.168.2.659071TCP
                  2025-03-06T04:04:39.236859+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.659077104.21.16.180TCP
                  2025-03-06T04:04:39.236859+01002025381ET MALWARE LokiBot Checkin1192.168.2.659077104.21.16.180TCP
                  2025-03-06T04:04:39.236859+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.659077104.21.16.180TCP
                  2025-03-06T04:04:40.007493+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.659077104.21.16.180TCP
                  2025-03-06T04:04:40.014611+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.16.180192.168.2.659077TCP
                  2025-03-06T04:04:41.158663+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.659081104.21.16.180TCP
                  2025-03-06T04:04:41.158663+01002025381ET MALWARE LokiBot Checkin1192.168.2.659081104.21.16.180TCP
                  2025-03-06T04:04:41.158663+01002825766ETPRO MALWARE LokiBot Checkin M21192.168.2.659081104.21.16.180TCP
                  2025-03-06T04:04:41.958238+01002024313ET MALWARE LokiBot Request for C2 Commands Detected M11192.168.2.659081104.21.16.180TCP
                  2025-03-06T04:04:41.963221+01002025483ET MALWARE LokiBot Fake 404 Response1104.21.16.180192.168.2.659081TCP
                  2025-03-06T04:04:43.126252+01002021641ET MALWARE LokiBot User-Agent (Charon/Inferno)1192.168.2.6